Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
Typedeb
Namespacedebian
Namecups
Version1.4.4-7+squeeze5
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.4.17-1
Latest_non_vulnerable_version2.4.17-1
Affected_by_vulnerabilities
0
url VCID-2chf-23mc-d3dn
vulnerability_id VCID-2chf-23mc-d3dn
summary cups: access to uninitialized buffer in ipp.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10001.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10001
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24831
published_at 2026-04-01T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24911
published_at 2026-04-02T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24951
published_at 2026-04-04T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24726
published_at 2026-04-07T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24793
published_at 2026-04-08T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24838
published_at 2026-04-09T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24852
published_at 2026-04-11T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24813
published_at 2026-04-12T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24756
published_at 2026-04-13T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24767
published_at 2026-04-16T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24759
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1921680
reference_id 1921680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1921680
4
reference_url https://security.archlinux.org/ASA-202102-13
reference_id ASA-202102-13
reference_type
scores
url https://security.archlinux.org/ASA-202102-13
5
reference_url https://security.archlinux.org/AVG-1529
reference_id AVG-1529
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1529
6
reference_url https://access.redhat.com/errata/RHSA-2021:4393
reference_id RHSA-2021:4393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4393
7
reference_url https://usn.ubuntu.com/5454-1/
reference_id USN-5454-1
reference_type
scores
url https://usn.ubuntu.com/5454-1/
8
reference_url https://usn.ubuntu.com/5454-2/
reference_id USN-5454-2
reference_type
scores
url https://usn.ubuntu.com/5454-2/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2020-10001
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2chf-23mc-d3dn
1
url VCID-35gf-189e-3ud4
vulnerability_id VCID-35gf-189e-3ud4
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0313.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0313.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2014-1388.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1388.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5029
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15133
published_at 2026-04-18T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15306
published_at 2026-04-01T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15343
published_at 2026-04-02T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15412
published_at 2026-04-04T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15216
published_at 2026-04-07T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15305
published_at 2026-04-08T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15354
published_at 2026-04-09T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15317
published_at 2026-04-11T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15277
published_at 2026-04-12T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15212
published_at 2026-04-13T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15126
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5029
4
reference_url https://cups.org/str.php?L4455
reference_id
reference_type
scores
url https://cups.org/str.php?L4455
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031
9
reference_url http://secunia.com/advisories/60509
reference_id
reference_type
scores
url http://secunia.com/advisories/60509
10
reference_url http://secunia.com/advisories/60787
reference_id
reference_type
scores
url http://secunia.com/advisories/60787
11
reference_url http://www.debian.org/security/2014/dsa-2990
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2990
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
13
reference_url http://www.openwall.com/lists/oss-security/2014/07/22/13
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/07/22/13
14
reference_url http://www.openwall.com/lists/oss-security/2014/07/22/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/07/22/2
15
reference_url http://www.ubuntu.com/usn/USN-2341-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2341-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1122600
reference_id 1122600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1122600
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5029
reference_id CVE-2014-5029
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-5029
22
reference_url https://access.redhat.com/errata/RHSA-2014:1388
reference_id RHSA-2014:1388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1388
23
reference_url https://usn.ubuntu.com/2341-1/
reference_id USN-2341-1
reference_type
scores
url https://usn.ubuntu.com/2341-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
1
url pkg:deb/debian/cups@1.7.5-11
purl pkg:deb/debian/cups@1.7.5-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3ame-feez-yqhc
2
vulnerability VCID-3etj-2m21-ffa1
3
vulnerability VCID-44ju-8618-vqht
4
vulnerability VCID-6mus-21kz-uuhz
5
vulnerability VCID-7wg4-sc9v-bffk
6
vulnerability VCID-993k-m3sq-gufu
7
vulnerability VCID-am36-6m5v-fkba
8
vulnerability VCID-apyh-1uza-pffa
9
vulnerability VCID-aznw-8yer-xfhf
10
vulnerability VCID-bzht-vhe3-y7bf
11
vulnerability VCID-ev9c-v5dv-37fb
12
vulnerability VCID-fkyp-m1p9-mfhy
13
vulnerability VCID-k4yw-jg6v-1bcc
14
vulnerability VCID-p8gy-dd3u-uqh4
15
vulnerability VCID-pwkd-sgtt-1bef
16
vulnerability VCID-q8a8-fd7r-1kg7
17
vulnerability VCID-qxwq-vp9g-ukca
18
vulnerability VCID-ucmb-we3r-aqcd
19
vulnerability VCID-vx54-r2dt-8ue5
20
vulnerability VCID-w17y-dvuq-7ba6
21
vulnerability VCID-wqu4-wys6-hfbb
22
vulnerability VCID-zjj3-g2d7-c3gd
23
vulnerability VCID-zt43-htwu-kfde
24
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11
aliases CVE-2014-5029
risk_score 0.7
exploitability 0.5
weighted_severity 1.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35gf-189e-3ud4
2
url VCID-39f1-22a5-c7aw
vulnerability_id VCID-39f1-22a5-c7aw
summary
Multiple vulnerabilities have been found in cups-filters, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3258
reference_id
reference_type
scores
0
value 0.37078
scoring_system epss
scoring_elements 0.97131
published_at 2026-04-01T12:55:00Z
1
value 0.37078
scoring_system epss
scoring_elements 0.97138
published_at 2026-04-02T12:55:00Z
2
value 0.37078
scoring_system epss
scoring_elements 0.97144
published_at 2026-04-04T12:55:00Z
3
value 0.37078
scoring_system epss
scoring_elements 0.97145
published_at 2026-04-07T12:55:00Z
4
value 0.37078
scoring_system epss
scoring_elements 0.97154
published_at 2026-04-08T12:55:00Z
5
value 0.37078
scoring_system epss
scoring_elements 0.97155
published_at 2026-04-09T12:55:00Z
6
value 0.37078
scoring_system epss
scoring_elements 0.97159
published_at 2026-04-11T12:55:00Z
7
value 0.37078
scoring_system epss
scoring_elements 0.9716
published_at 2026-04-12T12:55:00Z
8
value 0.37078
scoring_system epss
scoring_elements 0.97161
published_at 2026-04-13T12:55:00Z
9
value 0.37078
scoring_system epss
scoring_elements 0.97169
published_at 2026-04-16T12:55:00Z
10
value 0.37078
scoring_system epss
scoring_elements 0.9717
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3258
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1235385
reference_id 1235385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1235385
5
reference_url https://security.gentoo.org/glsa/201510-08
reference_id GLSA-201510-08
reference_type
scores
url https://security.gentoo.org/glsa/201510-08
6
reference_url https://access.redhat.com/errata/RHSA-2015:2360
reference_id RHSA-2015:2360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2360
7
reference_url https://usn.ubuntu.com/2659-1/
reference_id USN-2659-1
reference_type
scores
url https://usn.ubuntu.com/2659-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
aliases CVE-2015-3258
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-39f1-22a5-c7aw
3
url VCID-3ame-feez-yqhc
vulnerability_id VCID-3ame-feez-yqhc
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1158
reference_id
reference_type
scores
0
value 0.81706
scoring_system epss
scoring_elements 0.99181
published_at 2026-04-01T12:55:00Z
1
value 0.81706
scoring_system epss
scoring_elements 0.99183
published_at 2026-04-02T12:55:00Z
2
value 0.81706
scoring_system epss
scoring_elements 0.99185
published_at 2026-04-04T12:55:00Z
3
value 0.81706
scoring_system epss
scoring_elements 0.99188
published_at 2026-04-07T12:55:00Z
4
value 0.81706
scoring_system epss
scoring_elements 0.99189
published_at 2026-04-08T12:55:00Z
5
value 0.81706
scoring_system epss
scoring_elements 0.9919
published_at 2026-04-16T12:55:00Z
6
value 0.81706
scoring_system epss
scoring_elements 0.99192
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1158
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1221641
reference_id 1221641
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1221641
5
reference_url https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py
reference_id CVE-2015-1158
reference_type exploit
scores
url https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py
reference_id CVE-2015-1158
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py
7
reference_url http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html
reference_id CVE-2015-1158;OSVDB-123116
reference_type exploit
scores
url http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt
reference_id CVE-2015-1158;OSVDB-123116
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt
9
reference_url https://security.gentoo.org/glsa/201510-07
reference_id GLSA-201510-07
reference_type
scores
url https://security.gentoo.org/glsa/201510-07
10
reference_url https://access.redhat.com/errata/RHSA-2015:1123
reference_id RHSA-2015:1123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1123
11
reference_url https://usn.ubuntu.com/2629-1/
reference_id USN-2629-1
reference_type
scores
url https://usn.ubuntu.com/2629-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
1
url pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2
purl pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3ame-feez-yqhc
2
vulnerability VCID-3etj-2m21-ffa1
3
vulnerability VCID-44ju-8618-vqht
4
vulnerability VCID-6mus-21kz-uuhz
5
vulnerability VCID-7wg4-sc9v-bffk
6
vulnerability VCID-993k-m3sq-gufu
7
vulnerability VCID-am36-6m5v-fkba
8
vulnerability VCID-apyh-1uza-pffa
9
vulnerability VCID-aznw-8yer-xfhf
10
vulnerability VCID-bzht-vhe3-y7bf
11
vulnerability VCID-ev9c-v5dv-37fb
12
vulnerability VCID-fkyp-m1p9-mfhy
13
vulnerability VCID-k4yw-jg6v-1bcc
14
vulnerability VCID-p8gy-dd3u-uqh4
15
vulnerability VCID-pwkd-sgtt-1bef
16
vulnerability VCID-q8a8-fd7r-1kg7
17
vulnerability VCID-qxwq-vp9g-ukca
18
vulnerability VCID-ucmb-we3r-aqcd
19
vulnerability VCID-vx54-r2dt-8ue5
20
vulnerability VCID-w17y-dvuq-7ba6
21
vulnerability VCID-wqu4-wys6-hfbb
22
vulnerability VCID-zjj3-g2d7-c3gd
23
vulnerability VCID-zt43-htwu-kfde
24
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2
2
url pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1
purl pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-6mus-21kz-uuhz
4
vulnerability VCID-7wg4-sc9v-bffk
5
vulnerability VCID-993k-m3sq-gufu
6
vulnerability VCID-am36-6m5v-fkba
7
vulnerability VCID-apyh-1uza-pffa
8
vulnerability VCID-aznw-8yer-xfhf
9
vulnerability VCID-bzht-vhe3-y7bf
10
vulnerability VCID-ev9c-v5dv-37fb
11
vulnerability VCID-fkyp-m1p9-mfhy
12
vulnerability VCID-k4yw-jg6v-1bcc
13
vulnerability VCID-p8gy-dd3u-uqh4
14
vulnerability VCID-pwkd-sgtt-1bef
15
vulnerability VCID-q8a8-fd7r-1kg7
16
vulnerability VCID-qxwq-vp9g-ukca
17
vulnerability VCID-vx54-r2dt-8ue5
18
vulnerability VCID-w17y-dvuq-7ba6
19
vulnerability VCID-wqu4-wys6-hfbb
20
vulnerability VCID-zjj3-g2d7-c3gd
21
vulnerability VCID-zt43-htwu-kfde
22
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1
aliases CVE-2015-1158
risk_score 1.4
exploitability 2.0
weighted_severity 0.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ame-feez-yqhc
4
url VCID-3etj-2m21-ffa1
vulnerability_id VCID-3etj-2m21-ffa1
summary cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58364.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58364.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58364
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.30003
published_at 2026-04-04T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29955
published_at 2026-04-02T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31552
published_at 2026-04-18T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32467
published_at 2026-04-11T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.32439
published_at 2026-04-16T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.32402
published_at 2026-04-13T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.32429
published_at 2026-04-12T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32388
published_at 2026-04-07T12:55:00Z
8
value 0.0013
scoring_system epss
scoring_elements 0.32436
published_at 2026-04-08T12:55:00Z
9
value 0.0013
scoring_system epss
scoring_elements 0.32463
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58364
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2393078
reference_id 2393078
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2393078
5
reference_url https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d
reference_id e58cba9d6fceed4242980e51dbd1302cf638ab1d
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-11T17:37:26Z/
url https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d
6
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4
reference_id GHSA-7qx3-r744-6qv4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-11T17:37:26Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4
7
reference_url https://access.redhat.com/errata/RHSA-2025:15700
reference_id RHSA-2025:15700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15700
8
reference_url https://access.redhat.com/errata/RHSA-2025:15701
reference_id RHSA-2025:15701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15701
9
reference_url https://access.redhat.com/errata/RHSA-2025:16590
reference_id RHSA-2025:16590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16590
10
reference_url https://access.redhat.com/errata/RHSA-2025:16591
reference_id RHSA-2025:16591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16591
11
reference_url https://access.redhat.com/errata/RHSA-2025:16592
reference_id RHSA-2025:16592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16592
12
reference_url https://access.redhat.com/errata/RHSA-2025:22063
reference_id RHSA-2025:22063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22063
13
reference_url https://access.redhat.com/errata/RHSA-2026:8814
reference_id RHSA-2026:8814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8814
14
reference_url https://usn.ubuntu.com/7745-1/
reference_id USN-7745-1
reference_type
scores
url https://usn.ubuntu.com/7745-1/
fixed_packages
0
url pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9
purl pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-jy1y-e1nk-p3b4
5
vulnerability VCID-r1q4-2dq2-33ca
6
vulnerability VCID-ry9y-z4e4-yfdh
7
vulnerability VCID-vgtp-sjtt-73e9
8
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9
aliases CVE-2025-58364
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3etj-2m21-ffa1
5
url VCID-44ju-8618-vqht
vulnerability_id VCID-44ju-8618-vqht
summary A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-8842
reference_id
reference_type
scores
0
value 0.00352
scoring_system epss
scoring_elements 0.57671
published_at 2026-04-16T12:55:00Z
1
value 0.00352
scoring_system epss
scoring_elements 0.57528
published_at 2026-04-01T12:55:00Z
2
value 0.00352
scoring_system epss
scoring_elements 0.57612
published_at 2026-04-02T12:55:00Z
3
value 0.00352
scoring_system epss
scoring_elements 0.57633
published_at 2026-04-04T12:55:00Z
4
value 0.00352
scoring_system epss
scoring_elements 0.57609
published_at 2026-04-07T12:55:00Z
5
value 0.00352
scoring_system epss
scoring_elements 0.57663
published_at 2026-04-08T12:55:00Z
6
value 0.00352
scoring_system epss
scoring_elements 0.57667
published_at 2026-04-18T12:55:00Z
7
value 0.00352
scoring_system epss
scoring_elements 0.57682
published_at 2026-04-11T12:55:00Z
8
value 0.00352
scoring_system epss
scoring_elements 0.57661
published_at 2026-04-12T12:55:00Z
9
value 0.00352
scoring_system epss
scoring_elements 0.57641
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-8842
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://usn.ubuntu.com/5454-1/
reference_id USN-5454-1
reference_type
scores
url https://usn.ubuntu.com/5454-1/
4
reference_url https://usn.ubuntu.com/5454-2/
reference_id USN-5454-2
reference_type
scores
url https://usn.ubuntu.com/5454-2/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2019-8842
risk_score 0.7
exploitability 0.5
weighted_severity 1.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-44ju-8618-vqht
6
url VCID-48ht-j7ga-9ugq
vulnerability_id VCID-48ht-j7ga-9ugq
summary
Multiple vulnerabilities have been found in CUPS, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3170.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3170.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3170
reference_id
reference_type
scores
0
value 0.09148
scoring_system epss
scoring_elements 0.92649
published_at 2026-04-01T12:55:00Z
1
value 0.09148
scoring_system epss
scoring_elements 0.92656
published_at 2026-04-02T12:55:00Z
2
value 0.09148
scoring_system epss
scoring_elements 0.92662
published_at 2026-04-07T12:55:00Z
3
value 0.09148
scoring_system epss
scoring_elements 0.92673
published_at 2026-04-08T12:55:00Z
4
value 0.09148
scoring_system epss
scoring_elements 0.92677
published_at 2026-04-09T12:55:00Z
5
value 0.09148
scoring_system epss
scoring_elements 0.92683
published_at 2026-04-12T12:55:00Z
6
value 0.09148
scoring_system epss
scoring_elements 0.92682
published_at 2026-04-13T12:55:00Z
7
value 0.09148
scoring_system epss
scoring_elements 0.92696
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3170
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=732106
reference_id 732106
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=732106
4
reference_url https://security.gentoo.org/glsa/201207-10
reference_id GLSA-201207-10
reference_type
scores
url https://security.gentoo.org/glsa/201207-10
5
reference_url https://usn.ubuntu.com/1207-1/
reference_id USN-1207-1
reference_type
scores
url https://usn.ubuntu.com/1207-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
aliases CVE-2011-3170
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-48ht-j7ga-9ugq
7
url VCID-4bxg-5tnm-y3hw
vulnerability_id VCID-4bxg-5tnm-y3hw
summary
Multiple vulnerabilities have been found in cups-filters, worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6476
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.5254
published_at 2026-04-01T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52585
published_at 2026-04-02T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52612
published_at 2026-04-04T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52578
published_at 2026-04-07T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52629
published_at 2026-04-08T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52624
published_at 2026-04-09T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52674
published_at 2026-04-11T12:55:00Z
7
value 0.00293
scoring_system epss
scoring_elements 0.52657
published_at 2026-04-12T12:55:00Z
8
value 0.00293
scoring_system epss
scoring_elements 0.52642
published_at 2026-04-13T12:55:00Z
9
value 0.00293
scoring_system epss
scoring_elements 0.5268
published_at 2026-04-16T12:55:00Z
10
value 0.00293
scoring_system epss
scoring_elements 0.52687
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6476
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
reference_id 741318
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
reference_id 741333
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
6
reference_url https://security.gentoo.org/glsa/201406-16
reference_id GLSA-201406-16
reference_type
scores
url https://security.gentoo.org/glsa/201406-16
7
reference_url https://usn.ubuntu.com/2143-1/
reference_id USN-2143-1
reference_type
scores
url https://usn.ubuntu.com/2143-1/
8
reference_url https://usn.ubuntu.com/2144-1/
reference_id USN-2144-1
reference_type
scores
url https://usn.ubuntu.com/2144-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
aliases CVE-2013-6476
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4bxg-5tnm-y3hw
8
url VCID-6mus-21kz-uuhz
vulnerability_id VCID-6mus-21kz-uuhz
summary cups: Session cookie generated by the CUPS web interface is easy to guess
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4300.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4300.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-4300
reference_id
reference_type
scores
0
value 0.00377
scoring_system epss
scoring_elements 0.59268
published_at 2026-04-18T12:55:00Z
1
value 0.00377
scoring_system epss
scoring_elements 0.59226
published_at 2026-04-13T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59263
published_at 2026-04-16T12:55:00Z
3
value 0.00492
scoring_system epss
scoring_elements 0.65554
published_at 2026-04-01T12:55:00Z
4
value 0.00492
scoring_system epss
scoring_elements 0.65602
published_at 2026-04-02T12:55:00Z
5
value 0.00492
scoring_system epss
scoring_elements 0.65632
published_at 2026-04-04T12:55:00Z
6
value 0.00492
scoring_system epss
scoring_elements 0.65598
published_at 2026-04-07T12:55:00Z
7
value 0.00492
scoring_system epss
scoring_elements 0.65649
published_at 2026-04-08T12:55:00Z
8
value 0.00492
scoring_system epss
scoring_elements 0.65662
published_at 2026-04-09T12:55:00Z
9
value 0.00492
scoring_system epss
scoring_elements 0.65682
published_at 2026-04-11T12:55:00Z
10
value 0.00492
scoring_system epss
scoring_elements 0.65668
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-4300
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4300
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/apple/cups/releases/tag/v2.2.10
reference_id
reference_type
scores
url https://github.com/apple/cups/releases/tag/v2.2.10
5
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html
6
reference_url http://www.securityfocus.com/bid/107785
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107785
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1695929
reference_id 1695929
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1695929
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915909
reference_id 915909
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915909
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-4300
reference_id CVE-2018-4300
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-4300
11
reference_url https://access.redhat.com/errata/RHSA-2020:1050
reference_id RHSA-2020:1050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1050
fixed_packages
0
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2018-4300
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6mus-21kz-uuhz
9
url VCID-7wg4-sc9v-bffk
vulnerability_id VCID-7wg4-sc9v-bffk
summary cups: Information leak through Cups-Get-Document operation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32360.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32360.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32360
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20097
published_at 2026-04-02T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19921
published_at 2026-04-18T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20017
published_at 2026-04-09T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.20037
published_at 2026-04-11T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19992
published_at 2026-04-12T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19934
published_at 2026-04-13T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19917
published_at 2026-04-16T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20154
published_at 2026-04-04T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19884
published_at 2026-04-07T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19963
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051953
reference_id 1051953
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051953
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2230495
reference_id 2230495
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2230495
6
reference_url https://support.apple.com/en-us/HT213758
reference_id HT213758
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/
url https://support.apple.com/en-us/HT213758
7
reference_url https://support.apple.com/en-us/HT213759
reference_id HT213759
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/
url https://support.apple.com/en-us/HT213759
8
reference_url https://support.apple.com/en-us/HT213760
reference_id HT213760
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/
url https://support.apple.com/en-us/HT213760
9
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html
10
reference_url https://access.redhat.com/errata/RHSA-2023:4765
reference_id RHSA-2023:4765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4765
11
reference_url https://access.redhat.com/errata/RHSA-2023:4766
reference_id RHSA-2023:4766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4766
12
reference_url https://access.redhat.com/errata/RHSA-2023:4768
reference_id RHSA-2023:4768
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4768
13
reference_url https://access.redhat.com/errata/RHSA-2023:4769
reference_id RHSA-2023:4769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4769
14
reference_url https://access.redhat.com/errata/RHSA-2023:4770
reference_id RHSA-2023:4770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4770
15
reference_url https://access.redhat.com/errata/RHSA-2023:4771
reference_id RHSA-2023:4771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4771
16
reference_url https://access.redhat.com/errata/RHSA-2023:4838
reference_id RHSA-2023:4838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4838
17
reference_url https://access.redhat.com/errata/RHSA-2023:4864
reference_id RHSA-2023:4864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4864
18
reference_url https://usn.ubuntu.com/6361-1/
reference_id USN-6361-1
reference_type
scores
url https://usn.ubuntu.com/6361-1/
19
reference_url https://usn.ubuntu.com/6361-2/
reference_id USN-6361-2
reference_type
scores
url https://usn.ubuntu.com/6361-2/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2023-32360
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wg4-sc9v-bffk
10
url VCID-843p-8xve-nfer
vulnerability_id VCID-843p-8xve-nfer
summary
Multiple vulnerabilities have been found in cups-filters, worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6474
reference_id
reference_type
scores
0
value 0.20771
scoring_system epss
scoring_elements 0.95567
published_at 2026-04-01T12:55:00Z
1
value 0.20771
scoring_system epss
scoring_elements 0.95576
published_at 2026-04-02T12:55:00Z
2
value 0.20771
scoring_system epss
scoring_elements 0.95581
published_at 2026-04-04T12:55:00Z
3
value 0.20771
scoring_system epss
scoring_elements 0.95583
published_at 2026-04-07T12:55:00Z
4
value 0.20771
scoring_system epss
scoring_elements 0.95589
published_at 2026-04-08T12:55:00Z
5
value 0.20771
scoring_system epss
scoring_elements 0.95592
published_at 2026-04-09T12:55:00Z
6
value 0.20771
scoring_system epss
scoring_elements 0.95597
published_at 2026-04-11T12:55:00Z
7
value 0.20771
scoring_system epss
scoring_elements 0.95598
published_at 2026-04-12T12:55:00Z
8
value 0.20771
scoring_system epss
scoring_elements 0.956
published_at 2026-04-13T12:55:00Z
9
value 0.20771
scoring_system epss
scoring_elements 0.95609
published_at 2026-04-16T12:55:00Z
10
value 0.20771
scoring_system epss
scoring_elements 0.95613
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6474
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
reference_id 741318
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
reference_id 741333
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
6
reference_url https://security.gentoo.org/glsa/201406-16
reference_id GLSA-201406-16
reference_type
scores
url https://security.gentoo.org/glsa/201406-16
7
reference_url https://usn.ubuntu.com/2143-1/
reference_id USN-2143-1
reference_type
scores
url https://usn.ubuntu.com/2143-1/
8
reference_url https://usn.ubuntu.com/2144-1/
reference_id USN-2144-1
reference_type
scores
url https://usn.ubuntu.com/2144-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
aliases CVE-2013-6474
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-843p-8xve-nfer
11
url VCID-993k-m3sq-gufu
vulnerability_id VCID-993k-m3sq-gufu
summary cups: Authentication Bypass in CUPS Authorization Handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58060.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58060.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58060
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15471
published_at 2026-04-04T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15401
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16395
published_at 2026-04-18T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16551
published_at 2026-04-09T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16532
published_at 2026-04-11T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16494
published_at 2026-04-12T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16436
published_at 2026-04-13T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16376
published_at 2026-04-16T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16411
published_at 2026-04-07T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16496
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58060
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392595
reference_id 2392595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2392595
5
reference_url https://github.com/OpenPrinting/cups/commit/595d691075b1d396d2edfaa0a8fd0873a0a1f221
reference_id 595d691075b1d396d2edfaa0a8fd0873a0a1f221
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-11T17:33:32Z/
url https://github.com/OpenPrinting/cups/commit/595d691075b1d396d2edfaa0a8fd0873a0a1f221
6
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq
reference_id GHSA-4c68-qgrh-rmmq
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-11T17:33:32Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq
7
reference_url https://access.redhat.com/errata/RHSA-2025:15700
reference_id RHSA-2025:15700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15700
8
reference_url https://access.redhat.com/errata/RHSA-2025:15701
reference_id RHSA-2025:15701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15701
9
reference_url https://access.redhat.com/errata/RHSA-2025:15702
reference_id RHSA-2025:15702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15702
10
reference_url https://access.redhat.com/errata/RHSA-2025:16590
reference_id RHSA-2025:16590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16590
11
reference_url https://access.redhat.com/errata/RHSA-2025:16591
reference_id RHSA-2025:16591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16591
12
reference_url https://access.redhat.com/errata/RHSA-2025:16592
reference_id RHSA-2025:16592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16592
13
reference_url https://access.redhat.com/errata/RHSA-2025:17049
reference_id RHSA-2025:17049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17049
14
reference_url https://access.redhat.com/errata/RHSA-2025:17054
reference_id RHSA-2025:17054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17054
15
reference_url https://access.redhat.com/errata/RHSA-2025:17141
reference_id RHSA-2025:17141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17141
16
reference_url https://access.redhat.com/errata/RHSA-2025:17144
reference_id RHSA-2025:17144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17144
17
reference_url https://access.redhat.com/errata/RHSA-2025:17164
reference_id RHSA-2025:17164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17164
18
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
19
reference_url https://access.redhat.com/errata/RHSA-2026:8814
reference_id RHSA-2026:8814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8814
20
reference_url https://usn.ubuntu.com/7745-1/
reference_id USN-7745-1
reference_type
scores
url https://usn.ubuntu.com/7745-1/
fixed_packages
0
url pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9
purl pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-jy1y-e1nk-p3b4
5
vulnerability VCID-r1q4-2dq2-33ca
6
vulnerability VCID-ry9y-z4e4-yfdh
7
vulnerability VCID-vgtp-sjtt-73e9
8
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9
aliases CVE-2025-58060
risk_score 3.6
exploitability 0.5
weighted_severity 7.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-993k-m3sq-gufu
12
url VCID-am36-6m5v-fkba
vulnerability_id VCID-am36-6m5v-fkba
summary cups: libppd: remote command injection via attacker controlled data in PPD file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47175.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47175.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47175
reference_id
reference_type
scores
0
value 0.33103
scoring_system epss
scoring_elements 0.96909
published_at 2026-04-18T12:55:00Z
1
value 0.33103
scoring_system epss
scoring_elements 0.96878
published_at 2026-04-04T12:55:00Z
2
value 0.33103
scoring_system epss
scoring_elements 0.96883
published_at 2026-04-07T12:55:00Z
3
value 0.33103
scoring_system epss
scoring_elements 0.96891
published_at 2026-04-08T12:55:00Z
4
value 0.33103
scoring_system epss
scoring_elements 0.96893
published_at 2026-04-09T12:55:00Z
5
value 0.33103
scoring_system epss
scoring_elements 0.96895
published_at 2026-04-11T12:55:00Z
6
value 0.33103
scoring_system epss
scoring_elements 0.96897
published_at 2026-04-12T12:55:00Z
7
value 0.33103
scoring_system epss
scoring_elements 0.96898
published_at 2026-04-13T12:55:00Z
8
value 0.33103
scoring_system epss
scoring_elements 0.96905
published_at 2026-04-16T12:55:00Z
9
value 0.33659
scoring_system epss
scoring_elements 0.96918
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47175
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314256
reference_id 2314256
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314256
5
reference_url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
reference_id Attacking-UNIX-systems-via-CUPS-Part-I
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/
url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
6
reference_url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
reference_id GHSA-7xfx-47qg-grp6
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/
url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
7
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
reference_id GHSA-p9rh-jxmq-gq47
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
8
reference_url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
reference_id GHSA-rj88-6mr5-rcw8
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/
url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
9
reference_url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
reference_id GHSA-w63j-6g73-wmg5
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/
url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
10
reference_url https://access.redhat.com/errata/RHSA-2024:7346
reference_id RHSA-2024:7346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7346
11
reference_url https://access.redhat.com/errata/RHSA-2024:7461
reference_id RHSA-2024:7461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7461
12
reference_url https://access.redhat.com/errata/RHSA-2024:7462
reference_id RHSA-2024:7462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7462
13
reference_url https://access.redhat.com/errata/RHSA-2024:7463
reference_id RHSA-2024:7463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7463
14
reference_url https://access.redhat.com/errata/RHSA-2024:7503
reference_id RHSA-2024:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7503
15
reference_url https://access.redhat.com/errata/RHSA-2024:7504
reference_id RHSA-2024:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7504
16
reference_url https://access.redhat.com/errata/RHSA-2024:7506
reference_id RHSA-2024:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7506
17
reference_url https://access.redhat.com/errata/RHSA-2024:7551
reference_id RHSA-2024:7551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7551
18
reference_url https://access.redhat.com/errata/RHSA-2024:7553
reference_id RHSA-2024:7553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7553
19
reference_url https://access.redhat.com/errata/RHSA-2024:7623
reference_id RHSA-2024:7623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7623
20
reference_url https://access.redhat.com/errata/RHSA-2024:9470
reference_id RHSA-2024:9470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9470
21
reference_url https://access.redhat.com/errata/RHSA-2025:0083
reference_id RHSA-2025:0083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0083
22
reference_url https://usn.ubuntu.com/7041-1/
reference_id USN-7041-1
reference_type
scores
url https://usn.ubuntu.com/7041-1/
23
reference_url https://usn.ubuntu.com/7041-2/
reference_id USN-7041-2
reference_type
scores
url https://usn.ubuntu.com/7041-2/
24
reference_url https://usn.ubuntu.com/7041-3/
reference_id USN-7041-3
reference_type
scores
url https://usn.ubuntu.com/7041-3/
25
reference_url https://usn.ubuntu.com/7045-1/
reference_id USN-7045-1
reference_type
scores
url https://usn.ubuntu.com/7045-1/
26
reference_url https://www.cups.org
reference_id www.cups.org
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/
url https://www.cups.org
fixed_packages
0
url pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9
purl pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-jy1y-e1nk-p3b4
5
vulnerability VCID-r1q4-2dq2-33ca
6
vulnerability VCID-ry9y-z4e4-yfdh
7
vulnerability VCID-vgtp-sjtt-73e9
8
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9
aliases CVE-2024-47175
risk_score 10.0
exploitability 2.0
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-am36-6m5v-fkba
13
url VCID-anr5-gc12-e7dr
vulnerability_id VCID-anr5-gc12-e7dr
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0313.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0313.html
1
reference_url http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2014-1388.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1388.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3537
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16614
published_at 2026-04-18T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16637
published_at 2026-04-01T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16809
published_at 2026-04-02T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16867
published_at 2026-04-04T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16652
published_at 2026-04-07T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16737
published_at 2026-04-08T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16791
published_at 2026-04-09T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16771
published_at 2026-04-11T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16727
published_at 2026-04-12T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.1667
published_at 2026-04-13T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16606
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3537
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031
10
reference_url http://secunia.com/advisories/59945
reference_id
reference_type
scores
url http://secunia.com/advisories/59945
11
reference_url http://secunia.com/advisories/60273
reference_id
reference_type
scores
url http://secunia.com/advisories/60273
12
reference_url http://secunia.com/advisories/60787
reference_id
reference_type
scores
url http://secunia.com/advisories/60787
13
reference_url https://support.apple.com/kb/HT6535
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6535
14
reference_url http://www.cups.org/blog.php?L724
reference_id
reference_type
scores
url http://www.cups.org/blog.php?L724
15
reference_url http://www.cups.org/str.php?L4450
reference_id
reference_type
scores
url http://www.cups.org/str.php?L4450
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
17
reference_url http://www.securityfocus.com/bid/68788
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68788
18
reference_url http://www.securitytracker.com/id/1030611
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030611
19
reference_url http://www.ubuntu.com/usn/USN-2293-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2293-1
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1115576
reference_id 1115576
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1115576
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3537
reference_id CVE-2014-3537
reference_type
scores
0
value 1.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-3537
32
reference_url https://access.redhat.com/errata/RHSA-2014:1388
reference_id RHSA-2014:1388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1388
33
reference_url https://usn.ubuntu.com/2293-1/
reference_id USN-2293-1
reference_type
scores
url https://usn.ubuntu.com/2293-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
1
url pkg:deb/debian/cups@1.7.5-11
purl pkg:deb/debian/cups@1.7.5-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3ame-feez-yqhc
2
vulnerability VCID-3etj-2m21-ffa1
3
vulnerability VCID-44ju-8618-vqht
4
vulnerability VCID-6mus-21kz-uuhz
5
vulnerability VCID-7wg4-sc9v-bffk
6
vulnerability VCID-993k-m3sq-gufu
7
vulnerability VCID-am36-6m5v-fkba
8
vulnerability VCID-apyh-1uza-pffa
9
vulnerability VCID-aznw-8yer-xfhf
10
vulnerability VCID-bzht-vhe3-y7bf
11
vulnerability VCID-ev9c-v5dv-37fb
12
vulnerability VCID-fkyp-m1p9-mfhy
13
vulnerability VCID-k4yw-jg6v-1bcc
14
vulnerability VCID-p8gy-dd3u-uqh4
15
vulnerability VCID-pwkd-sgtt-1bef
16
vulnerability VCID-q8a8-fd7r-1kg7
17
vulnerability VCID-qxwq-vp9g-ukca
18
vulnerability VCID-ucmb-we3r-aqcd
19
vulnerability VCID-vx54-r2dt-8ue5
20
vulnerability VCID-w17y-dvuq-7ba6
21
vulnerability VCID-wqu4-wys6-hfbb
22
vulnerability VCID-zjj3-g2d7-c3gd
23
vulnerability VCID-zt43-htwu-kfde
24
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11
aliases CVE-2014-3537
risk_score 0.6
exploitability 0.5
weighted_severity 1.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-anr5-gc12-e7dr
14
url VCID-apyh-1uza-pffa
vulnerability_id VCID-apyh-1uza-pffa
summary In array_find of array.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure in the printer spooler with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-111210196
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2228
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.28106
published_at 2026-04-01T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28179
published_at 2026-04-02T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.28222
published_at 2026-04-04T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28017
published_at 2026-04-07T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.28084
published_at 2026-04-08T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28128
published_at 2026-04-09T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.28134
published_at 2026-04-11T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.28091
published_at 2026-04-12T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.28033
published_at 2026-04-13T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.28043
published_at 2026-04-16T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.28026
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2228
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2228
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2228
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946782
reference_id 946782
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946782
3
reference_url https://usn.ubuntu.com/4340-1/
reference_id USN-4340-1
reference_type
scores
url https://usn.ubuntu.com/4340-1/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2019-2228
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apyh-1uza-pffa
15
url VCID-aznw-8yer-xfhf
vulnerability_id VCID-aznw-8yer-xfhf
summary Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34241
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09741
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09686
published_at 2026-04-07T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.0979
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09768
published_at 2026-04-13T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09785
published_at 2026-04-12T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09816
published_at 2026-04-11T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09807
published_at 2026-04-09T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09757
published_at 2026-04-08T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10737
published_at 2026-04-16T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.1158
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34241
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2023/06/26/1
reference_id 1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url http://www.openwall.com/lists/oss-security/2023/06/26/1
5
reference_url http://www.openwall.com/lists/oss-security/2023/06/23/10
reference_id 10
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url http://www.openwall.com/lists/oss-security/2023/06/23/10
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885
reference_id 1038885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2214914
reference_id 2214914
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2214914
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/
reference_id 7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/
9
reference_url https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2
reference_id 9809947a959e18409dcf562a3466ef246cb90cb2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2
10
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25
reference_id GHSA-qjgh-5hcq-5f25
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25
11
reference_url https://security.gentoo.org/glsa/202402-17
reference_id GLSA-202402-17
reference_type
scores
url https://security.gentoo.org/glsa/202402-17
12
reference_url https://support.apple.com/kb/HT213843
reference_id HT213843
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://support.apple.com/kb/HT213843
13
reference_url https://support.apple.com/kb/HT213844
reference_id HT213844
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://support.apple.com/kb/HT213844
14
reference_url https://support.apple.com/kb/HT213845
reference_id HT213845
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://support.apple.com/kb/HT213845
15
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html
16
reference_url https://access.redhat.com/errata/RHSA-2023:6596
reference_id RHSA-2023:6596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6596
17
reference_url https://access.redhat.com/errata/RHSA-2023:7165
reference_id RHSA-2023:7165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7165
18
reference_url https://access.redhat.com/errata/RHSA-2024:1101
reference_id RHSA-2024:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1101
19
reference_url https://access.redhat.com/errata/RHSA-2024:1409
reference_id RHSA-2024:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1409
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/
reference_id TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/
21
reference_url https://usn.ubuntu.com/6184-1/
reference_id USN-6184-1
reference_type
scores
url https://usn.ubuntu.com/6184-1/
22
reference_url https://usn.ubuntu.com/6184-2/
reference_id USN-6184-2
reference_type
scores
url https://usn.ubuntu.com/6184-2/
23
reference_url https://github.com/OpenPrinting/cups/releases/tag/v2.4.6
reference_id v2.4.6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://github.com/OpenPrinting/cups/releases/tag/v2.4.6
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2023-34241
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aznw-8yer-xfhf
16
url VCID-bzht-vhe3-y7bf
vulnerability_id VCID-bzht-vhe3-y7bf
summary
Multiple vulnerabilities have been found in CUPS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-4180
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30171
published_at 2026-04-18T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30176
published_at 2026-04-13T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.3019
published_at 2026-04-16T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.40864
published_at 2026-04-01T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40946
published_at 2026-04-02T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40975
published_at 2026-04-11T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.409
published_at 2026-04-07T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.4095
published_at 2026-04-08T12:55:00Z
8
value 0.0019
scoring_system epss
scoring_elements 0.40957
published_at 2026-04-09T12:55:00Z
9
value 0.0019
scoring_system epss
scoring_elements 0.40939
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-4180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
8
reference_url https://support.apple.com/HT208849
reference_id
reference_type
scores
url https://support.apple.com/HT208849
9
reference_url https://www.debian.org/security/2018/dsa-4243
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4243
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1607282
reference_id 1607282
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1607282
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-4180
reference_id CVE-2018-4180
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-4180
18
reference_url https://security.gentoo.org/glsa/201908-08
reference_id GLSA-201908-08
reference_type
scores
url https://security.gentoo.org/glsa/201908-08
19
reference_url https://access.redhat.com/errata/RHSA-2020:1050
reference_id RHSA-2020:1050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1050
20
reference_url https://usn.ubuntu.com/3713-1/
reference_id USN-3713-1
reference_type
scores
url https://usn.ubuntu.com/3713-1/
fixed_packages
0
url pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
purl pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-6mus-21kz-uuhz
4
vulnerability VCID-7wg4-sc9v-bffk
5
vulnerability VCID-993k-m3sq-gufu
6
vulnerability VCID-am36-6m5v-fkba
7
vulnerability VCID-apyh-1uza-pffa
8
vulnerability VCID-aznw-8yer-xfhf
9
vulnerability VCID-bzht-vhe3-y7bf
10
vulnerability VCID-ev9c-v5dv-37fb
11
vulnerability VCID-fkyp-m1p9-mfhy
12
vulnerability VCID-k4yw-jg6v-1bcc
13
vulnerability VCID-p8gy-dd3u-uqh4
14
vulnerability VCID-pwkd-sgtt-1bef
15
vulnerability VCID-q8a8-fd7r-1kg7
16
vulnerability VCID-qxwq-vp9g-ukca
17
vulnerability VCID-vx54-r2dt-8ue5
18
vulnerability VCID-w17y-dvuq-7ba6
19
vulnerability VCID-wqu4-wys6-hfbb
20
vulnerability VCID-zjj3-g2d7-c3gd
21
vulnerability VCID-zt43-htwu-kfde
22
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6
1
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2018-4180
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bzht-vhe3-y7bf
17
url VCID-cf81-58ju-bqaz
vulnerability_id VCID-cf81-58ju-bqaz
summary cups: cross-site scripting flaw fixed in the 1.7.2 release
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2856.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2856.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2856
reference_id
reference_type
scores
0
value 0.01035
scoring_system epss
scoring_elements 0.77324
published_at 2026-04-01T12:55:00Z
1
value 0.01035
scoring_system epss
scoring_elements 0.77331
published_at 2026-04-02T12:55:00Z
2
value 0.01035
scoring_system epss
scoring_elements 0.77359
published_at 2026-04-04T12:55:00Z
3
value 0.01035
scoring_system epss
scoring_elements 0.7734
published_at 2026-04-07T12:55:00Z
4
value 0.01035
scoring_system epss
scoring_elements 0.7737
published_at 2026-04-08T12:55:00Z
5
value 0.01035
scoring_system epss
scoring_elements 0.77379
published_at 2026-04-09T12:55:00Z
6
value 0.01035
scoring_system epss
scoring_elements 0.77406
published_at 2026-04-11T12:55:00Z
7
value 0.01035
scoring_system epss
scoring_elements 0.77385
published_at 2026-04-12T12:55:00Z
8
value 0.01035
scoring_system epss
scoring_elements 0.77382
published_at 2026-04-13T12:55:00Z
9
value 0.01035
scoring_system epss
scoring_elements 0.77422
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2856
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1087122
reference_id 1087122
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1087122
4
reference_url https://access.redhat.com/errata/RHSA-2014:1388
reference_id RHSA-2014:1388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1388
5
reference_url https://usn.ubuntu.com/2172-1/
reference_id USN-2172-1
reference_type
scores
url https://usn.ubuntu.com/2172-1/
fixed_packages
0
url pkg:deb/debian/cups@1.7.5-11
purl pkg:deb/debian/cups@1.7.5-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3ame-feez-yqhc
2
vulnerability VCID-3etj-2m21-ffa1
3
vulnerability VCID-44ju-8618-vqht
4
vulnerability VCID-6mus-21kz-uuhz
5
vulnerability VCID-7wg4-sc9v-bffk
6
vulnerability VCID-993k-m3sq-gufu
7
vulnerability VCID-am36-6m5v-fkba
8
vulnerability VCID-apyh-1uza-pffa
9
vulnerability VCID-aznw-8yer-xfhf
10
vulnerability VCID-bzht-vhe3-y7bf
11
vulnerability VCID-ev9c-v5dv-37fb
12
vulnerability VCID-fkyp-m1p9-mfhy
13
vulnerability VCID-k4yw-jg6v-1bcc
14
vulnerability VCID-p8gy-dd3u-uqh4
15
vulnerability VCID-pwkd-sgtt-1bef
16
vulnerability VCID-q8a8-fd7r-1kg7
17
vulnerability VCID-qxwq-vp9g-ukca
18
vulnerability VCID-ucmb-we3r-aqcd
19
vulnerability VCID-vx54-r2dt-8ue5
20
vulnerability VCID-w17y-dvuq-7ba6
21
vulnerability VCID-wqu4-wys6-hfbb
22
vulnerability VCID-zjj3-g2d7-c3gd
23
vulnerability VCID-zt43-htwu-kfde
24
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11
aliases CVE-2014-2856
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cf81-58ju-bqaz
18
url VCID-ed99-uccv-d7bh
vulnerability_id VCID-ed99-uccv-d7bh
summary
Multiple vulnerabilities have been found in cups-filters, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3279
reference_id
reference_type
scores
0
value 0.34505
scoring_system epss
scoring_elements 0.96967
published_at 2026-04-01T12:55:00Z
1
value 0.34505
scoring_system epss
scoring_elements 0.96975
published_at 2026-04-02T12:55:00Z
2
value 0.34505
scoring_system epss
scoring_elements 0.96979
published_at 2026-04-04T12:55:00Z
3
value 0.34505
scoring_system epss
scoring_elements 0.96981
published_at 2026-04-07T12:55:00Z
4
value 0.34505
scoring_system epss
scoring_elements 0.9699
published_at 2026-04-08T12:55:00Z
5
value 0.34505
scoring_system epss
scoring_elements 0.96991
published_at 2026-04-09T12:55:00Z
6
value 0.34505
scoring_system epss
scoring_elements 0.96993
published_at 2026-04-11T12:55:00Z
7
value 0.34505
scoring_system epss
scoring_elements 0.96994
published_at 2026-04-12T12:55:00Z
8
value 0.34505
scoring_system epss
scoring_elements 0.96995
published_at 2026-04-13T12:55:00Z
9
value 0.34505
scoring_system epss
scoring_elements 0.97004
published_at 2026-04-16T12:55:00Z
10
value 0.34505
scoring_system epss
scoring_elements 0.97007
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3279
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1238990
reference_id 1238990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1238990
5
reference_url https://security.gentoo.org/glsa/201510-08
reference_id GLSA-201510-08
reference_type
scores
url https://security.gentoo.org/glsa/201510-08
6
reference_url https://access.redhat.com/errata/RHSA-2015:2360
reference_id RHSA-2015:2360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2360
7
reference_url https://usn.ubuntu.com/2659-1/
reference_id USN-2659-1
reference_type
scores
url https://usn.ubuntu.com/2659-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
aliases CVE-2015-3279
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ed99-uccv-d7bh
19
url VCID-ev9c-v5dv-37fb
vulnerability_id VCID-ev9c-v5dv-37fb
summary cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3898.json
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3898.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-3898
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37102
published_at 2026-04-01T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37269
published_at 2026-04-02T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37296
published_at 2026-04-04T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.37125
published_at 2026-04-07T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37177
published_at 2026-04-08T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.3719
published_at 2026-04-09T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37201
published_at 2026-04-11T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37167
published_at 2026-04-18T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.3714
published_at 2026-04-13T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37185
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-3898
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823964
reference_id 1823964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823964
5
reference_url https://access.redhat.com/errata/RHSA-2020:4469
reference_id RHSA-2020:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4469
6
reference_url https://usn.ubuntu.com/4340-1/
reference_id USN-4340-1
reference_type
scores
url https://usn.ubuntu.com/4340-1/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2020-3898
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ev9c-v5dv-37fb
20
url VCID-fby6-8f6z-63fw
vulnerability_id VCID-fby6-8f6z-63fw
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0313.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0313.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2014-1388.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1388.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5030
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16134
published_at 2026-04-18T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16109
published_at 2026-04-01T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16292
published_at 2026-04-02T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16354
published_at 2026-04-04T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16153
published_at 2026-04-07T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16239
published_at 2026-04-08T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16304
published_at 2026-04-09T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16286
published_at 2026-04-11T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16247
published_at 2026-04-12T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16179
published_at 2026-04-13T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16116
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5030
4
reference_url https://cups.org/str.php?L4455
reference_id
reference_type
scores
url https://cups.org/str.php?L4455
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031
9
reference_url http://secunia.com/advisories/60509
reference_id
reference_type
scores
url http://secunia.com/advisories/60509
10
reference_url http://secunia.com/advisories/60787
reference_id
reference_type
scores
url http://secunia.com/advisories/60787
11
reference_url http://www.debian.org/security/2014/dsa-2990
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2990
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
13
reference_url http://www.openwall.com/lists/oss-security/2014/07/22/13
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/07/22/13
14
reference_url http://www.openwall.com/lists/oss-security/2014/07/22/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/07/22/2
15
reference_url http://www.ubuntu.com/usn/USN-2341-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2341-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1128764
reference_id 1128764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1128764
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5030
reference_id CVE-2014-5030
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-5030
28
reference_url https://access.redhat.com/errata/RHSA-2014:1388
reference_id RHSA-2014:1388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1388
29
reference_url https://usn.ubuntu.com/2341-1/
reference_id USN-2341-1
reference_type
scores
url https://usn.ubuntu.com/2341-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
1
url pkg:deb/debian/cups@1.7.5-11
purl pkg:deb/debian/cups@1.7.5-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3ame-feez-yqhc
2
vulnerability VCID-3etj-2m21-ffa1
3
vulnerability VCID-44ju-8618-vqht
4
vulnerability VCID-6mus-21kz-uuhz
5
vulnerability VCID-7wg4-sc9v-bffk
6
vulnerability VCID-993k-m3sq-gufu
7
vulnerability VCID-am36-6m5v-fkba
8
vulnerability VCID-apyh-1uza-pffa
9
vulnerability VCID-aznw-8yer-xfhf
10
vulnerability VCID-bzht-vhe3-y7bf
11
vulnerability VCID-ev9c-v5dv-37fb
12
vulnerability VCID-fkyp-m1p9-mfhy
13
vulnerability VCID-k4yw-jg6v-1bcc
14
vulnerability VCID-p8gy-dd3u-uqh4
15
vulnerability VCID-pwkd-sgtt-1bef
16
vulnerability VCID-q8a8-fd7r-1kg7
17
vulnerability VCID-qxwq-vp9g-ukca
18
vulnerability VCID-ucmb-we3r-aqcd
19
vulnerability VCID-vx54-r2dt-8ue5
20
vulnerability VCID-w17y-dvuq-7ba6
21
vulnerability VCID-wqu4-wys6-hfbb
22
vulnerability VCID-zjj3-g2d7-c3gd
23
vulnerability VCID-zt43-htwu-kfde
24
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11
aliases CVE-2014-5030
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fby6-8f6z-63fw
21
url VCID-fkyp-m1p9-mfhy
vulnerability_id VCID-fkyp-m1p9-mfhy
summary cups: Invalid usernames handled in scheduler/ipp.c:add_job() allow remote attackers to cause a denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18248.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18248.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18248
reference_id
reference_type
scores
0
value 0.01002
scoring_system epss
scoring_elements 0.76945
published_at 2026-04-01T12:55:00Z
1
value 0.01002
scoring_system epss
scoring_elements 0.76951
published_at 2026-04-02T12:55:00Z
2
value 0.01002
scoring_system epss
scoring_elements 0.7698
published_at 2026-04-04T12:55:00Z
3
value 0.01002
scoring_system epss
scoring_elements 0.76962
published_at 2026-04-07T12:55:00Z
4
value 0.01002
scoring_system epss
scoring_elements 0.76994
published_at 2026-04-08T12:55:00Z
5
value 0.01002
scoring_system epss
scoring_elements 0.77006
published_at 2026-04-09T12:55:00Z
6
value 0.01002
scoring_system epss
scoring_elements 0.77034
published_at 2026-04-11T12:55:00Z
7
value 0.01002
scoring_system epss
scoring_elements 0.77012
published_at 2026-04-12T12:55:00Z
8
value 0.01002
scoring_system epss
scoring_elements 0.77009
published_at 2026-04-13T12:55:00Z
9
value 0.01002
scoring_system epss
scoring_elements 0.7705
published_at 2026-04-16T12:55:00Z
10
value 0.01002
scoring_system epss
scoring_elements 0.77052
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18248
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18248
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1561296
reference_id 1561296
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1561296
5
reference_url https://usn.ubuntu.com/3713-1/
reference_id USN-3713-1
reference_type
scores
url https://usn.ubuntu.com/3713-1/
fixed_packages
0
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2017-18248
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fkyp-m1p9-mfhy
22
url VCID-k4yw-jg6v-1bcc
vulnerability_id VCID-k4yw-jg6v-1bcc
summary cups: Cupsd Listen arbitrary chmod 0140777
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35235.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-35235
reference_id
reference_type
scores
0
value 0.03102
scoring_system epss
scoring_elements 0.86826
published_at 2026-04-18T12:55:00Z
1
value 0.03102
scoring_system epss
scoring_elements 0.86756
published_at 2026-04-02T12:55:00Z
2
value 0.03102
scoring_system epss
scoring_elements 0.86776
published_at 2026-04-04T12:55:00Z
3
value 0.03102
scoring_system epss
scoring_elements 0.86773
published_at 2026-04-07T12:55:00Z
4
value 0.03102
scoring_system epss
scoring_elements 0.86793
published_at 2026-04-08T12:55:00Z
5
value 0.03102
scoring_system epss
scoring_elements 0.86802
published_at 2026-04-09T12:55:00Z
6
value 0.03102
scoring_system epss
scoring_elements 0.86815
published_at 2026-04-11T12:55:00Z
7
value 0.03102
scoring_system epss
scoring_elements 0.86811
published_at 2026-04-12T12:55:00Z
8
value 0.03102
scoring_system epss
scoring_elements 0.86807
published_at 2026-04-13T12:55:00Z
9
value 0.03102
scoring_system epss
scoring_elements 0.86822
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-35235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/06/11/1
reference_id 1
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url http://www.openwall.com/lists/oss-security/2024/06/11/1
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073002
reference_id 1073002
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073002
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2290318
reference_id 2290318
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2290318
7
reference_url http://www.openwall.com/lists/oss-security/2024/06/12/4
reference_id 4
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url http://www.openwall.com/lists/oss-security/2024/06/12/4
8
reference_url http://www.openwall.com/lists/oss-security/2024/06/12/5
reference_id 5
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url http://www.openwall.com/lists/oss-security/2024/06/12/5
9
reference_url https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d
reference_id ff1f8a623e090dee8a8aadf12a6a4b25efac143d
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d
10
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f
reference_id GHSA-vvwp-mv6j-hw6f
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f
11
reference_url https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240
reference_id http-addr.c#L229-L240
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240
12
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html
13
reference_url https://access.redhat.com/errata/RHSA-2024:4265
reference_id RHSA-2024:4265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4265
14
reference_url https://access.redhat.com/errata/RHSA-2024:4580
reference_id RHSA-2024:4580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4580
15
reference_url https://access.redhat.com/errata/RHSA-2024:4715
reference_id RHSA-2024:4715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4715
16
reference_url https://access.redhat.com/errata/RHSA-2024:4776
reference_id RHSA-2024:4776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4776
17
reference_url https://access.redhat.com/errata/RHSA-2024:5644
reference_id RHSA-2024:5644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5644
18
reference_url https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21
reference_id user-tmp#n21
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21
19
reference_url https://usn.ubuntu.com/6844-1/
reference_id USN-6844-1
reference_type
scores
url https://usn.ubuntu.com/6844-1/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2024-35235
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4yw-jg6v-1bcc
23
url VCID-mcmb-bvw9-dba5
vulnerability_id VCID-mcmb-bvw9-dba5
summary
Multiple vulnerabilities have been found in cups-filters, worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6475
reference_id
reference_type
scores
0
value 0.20679
scoring_system epss
scoring_elements 0.95557
published_at 2026-04-01T12:55:00Z
1
value 0.20679
scoring_system epss
scoring_elements 0.95566
published_at 2026-04-02T12:55:00Z
2
value 0.20679
scoring_system epss
scoring_elements 0.95571
published_at 2026-04-04T12:55:00Z
3
value 0.20679
scoring_system epss
scoring_elements 0.95573
published_at 2026-04-07T12:55:00Z
4
value 0.20679
scoring_system epss
scoring_elements 0.9558
published_at 2026-04-08T12:55:00Z
5
value 0.20679
scoring_system epss
scoring_elements 0.95583
published_at 2026-04-09T12:55:00Z
6
value 0.20679
scoring_system epss
scoring_elements 0.95588
published_at 2026-04-11T12:55:00Z
7
value 0.20679
scoring_system epss
scoring_elements 0.95589
published_at 2026-04-12T12:55:00Z
8
value 0.20679
scoring_system epss
scoring_elements 0.9559
published_at 2026-04-13T12:55:00Z
9
value 0.20679
scoring_system epss
scoring_elements 0.95599
published_at 2026-04-16T12:55:00Z
10
value 0.20679
scoring_system epss
scoring_elements 0.95604
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6475
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1027550
reference_id 1027550
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1027550
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
reference_id 741318
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
reference_id 741333
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
8
reference_url https://security.gentoo.org/glsa/201406-16
reference_id GLSA-201406-16
reference_type
scores
url https://security.gentoo.org/glsa/201406-16
9
reference_url https://usn.ubuntu.com/2143-1/
reference_id USN-2143-1
reference_type
scores
url https://usn.ubuntu.com/2143-1/
10
reference_url https://usn.ubuntu.com/2144-1/
reference_id USN-2144-1
reference_type
scores
url https://usn.ubuntu.com/2144-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
aliases CVE-2013-6475
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mcmb-bvw9-dba5
24
url VCID-mtzd-538p-kbhm
vulnerability_id VCID-mtzd-538p-kbhm
summary A vulnerability in CUPS may allow for arbitrary file access.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791
1
reference_url http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-0580.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0580.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5519.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5519.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5519
reference_id
reference_type
scores
0
value 0.10228
scoring_system epss
scoring_elements 0.93164
published_at 2026-04-18T12:55:00Z
1
value 0.10228
scoring_system epss
scoring_elements 0.93114
published_at 2026-04-01T12:55:00Z
2
value 0.10228
scoring_system epss
scoring_elements 0.93123
published_at 2026-04-02T12:55:00Z
3
value 0.10228
scoring_system epss
scoring_elements 0.93127
published_at 2026-04-04T12:55:00Z
4
value 0.10228
scoring_system epss
scoring_elements 0.93126
published_at 2026-04-07T12:55:00Z
5
value 0.10228
scoring_system epss
scoring_elements 0.93134
published_at 2026-04-08T12:55:00Z
6
value 0.10228
scoring_system epss
scoring_elements 0.93139
published_at 2026-04-09T12:55:00Z
7
value 0.10228
scoring_system epss
scoring_elements 0.93144
published_at 2026-04-11T12:55:00Z
8
value 0.10228
scoring_system epss
scoring_elements 0.93141
published_at 2026-04-12T12:55:00Z
9
value 0.10228
scoring_system epss
scoring_elements 0.93143
published_at 2026-04-13T12:55:00Z
10
value 0.10228
scoring_system epss
scoring_elements 0.93159
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5519
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80012
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80012
10
reference_url http://support.apple.com/kb/HT5784
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5784
11
reference_url http://www.openwall.com/lists/oss-security/2012/11/10/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/10/5
12
reference_url http://www.openwall.com/lists/oss-security/2012/11/11/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/11/2
13
reference_url http://www.openwall.com/lists/oss-security/2012/11/11/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/11/5
14
reference_url http://www.securityfocus.com/bid/56494
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56494
15
reference_url http://www.ubuntu.com/usn/USN-1654-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1654-1
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791
reference_id 692791
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=875898
reference_id 875898
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=875898
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5519
reference_id CVE-2012-5519
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-5519
21
reference_url https://security.gentoo.org/glsa/201404-01
reference_id GLSA-201404-01
reference_type
scores
url https://security.gentoo.org/glsa/201404-01
22
reference_url https://access.redhat.com/errata/RHSA-2013:0580
reference_id RHSA-2013:0580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0580
23
reference_url https://usn.ubuntu.com/1654-1/
reference_id USN-1654-1
reference_type
scores
url https://usn.ubuntu.com/1654-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
aliases CVE-2012-5519
risk_score 10.0
exploitability 2.0
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mtzd-538p-kbhm
25
url VCID-p8gy-dd3u-uqh4
vulnerability_id VCID-p8gy-dd3u-uqh4
summary Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26691
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09443
published_at 2026-04-02T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09492
published_at 2026-04-04T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.10972
published_at 2026-04-09T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.10974
published_at 2026-04-11T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.10942
published_at 2026-04-12T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.10918
published_at 2026-04-13T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.10782
published_at 2026-04-16T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.10796
published_at 2026-04-18T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.10841
published_at 2026-04-07T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.10917
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c
reference_id
reference_type
scores
url https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c
5
reference_url https://support.apple.com/en-us/HT213183
reference_id
reference_type
scores
url https://support.apple.com/en-us/HT213183
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769
reference_id 1011769
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2084321
reference_id 2084321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2084321
8
reference_url https://security.gentoo.org/glsa/202402-17
reference_id GLSA-202402-17
reference_type
scores
url https://security.gentoo.org/glsa/202402-17
9
reference_url https://access.redhat.com/errata/RHSA-2022:4990
reference_id RHSA-2022:4990
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4990
10
reference_url https://access.redhat.com/errata/RHSA-2022:5054
reference_id RHSA-2022:5054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5054
11
reference_url https://access.redhat.com/errata/RHSA-2022:5055
reference_id RHSA-2022:5055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5055
12
reference_url https://access.redhat.com/errata/RHSA-2022:5056
reference_id RHSA-2022:5056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5056
13
reference_url https://access.redhat.com/errata/RHSA-2022:5057
reference_id RHSA-2022:5057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5057
14
reference_url https://usn.ubuntu.com/5454-1/
reference_id USN-5454-1
reference_type
scores
url https://usn.ubuntu.com/5454-1/
15
reference_url https://usn.ubuntu.com/5454-2/
reference_id USN-5454-2
reference_type
scores
url https://usn.ubuntu.com/5454-2/
fixed_packages
0
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
1
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2022-26691, MNDT-2022-0026
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p8gy-dd3u-uqh4
26
url VCID-pwkd-sgtt-1bef
vulnerability_id VCID-pwkd-sgtt-1bef
summary cups: DNS rebinding attacks via incorrect whitelist
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18190.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18190.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18190
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.71939
published_at 2026-04-01T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.71947
published_at 2026-04-02T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.71966
published_at 2026-04-04T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71943
published_at 2026-04-07T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.71981
published_at 2026-04-08T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.71993
published_at 2026-04-09T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72017
published_at 2026-04-11T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72001
published_at 2026-04-12T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.71985
published_at 2026-04-13T12:55:00Z
9
value 0.007
scoring_system epss
scoring_elements 0.72026
published_at 2026-04-16T12:55:00Z
10
value 0.007
scoring_system epss
scoring_elements 0.72034
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18190
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1546395
reference_id 1546395
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1546395
5
reference_url https://access.redhat.com/errata/RHSA-2020:3864
reference_id RHSA-2020:3864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3864
6
reference_url https://usn.ubuntu.com/3577-1/
reference_id USN-3577-1
reference_type
scores
url https://usn.ubuntu.com/3577-1/
fixed_packages
0
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2017-18190
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwkd-sgtt-1bef
27
url VCID-q8a8-fd7r-1kg7
vulnerability_id VCID-q8a8-fd7r-1kg7
summary Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32324
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46866
published_at 2026-04-02T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.4683
published_at 2026-04-07T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46883
published_at 2026-04-04T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46885
published_at 2026-04-08T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46884
published_at 2026-04-09T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46907
published_at 2026-04-11T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.4688
published_at 2026-04-12T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46887
published_at 2026-04-13T12:55:00Z
8
value 0.00259
scoring_system epss
scoring_elements 0.49279
published_at 2026-04-16T12:55:00Z
9
value 0.00259
scoring_system epss
scoring_elements 0.49276
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32324
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2209603
reference_id 2209603
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2209603
5
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7
reference_id GHSA-cxc6-w2g7-69p7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7
6
reference_url https://security.gentoo.org/glsa/202402-17
reference_id GLSA-202402-17
reference_type
scores
url https://security.gentoo.org/glsa/202402-17
7
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:6596
reference_id RHSA-2023:6596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6596
9
reference_url https://access.redhat.com/errata/RHSA-2023:7165
reference_id RHSA-2023:7165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7165
10
reference_url https://access.redhat.com/errata/RHSA-2024:1101
reference_id RHSA-2024:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1101
11
reference_url https://access.redhat.com/errata/RHSA-2024:1409
reference_id RHSA-2024:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1409
12
reference_url https://usn.ubuntu.com/6128-1/
reference_id USN-6128-1
reference_type
scores
url https://usn.ubuntu.com/6128-1/
13
reference_url https://usn.ubuntu.com/6128-2/
reference_id USN-6128-2
reference_type
scores
url https://usn.ubuntu.com/6128-2/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2023-32324
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8a8-fd7r-1kg7
28
url VCID-qxwq-vp9g-ukca
vulnerability_id VCID-qxwq-vp9g-ukca
summary In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2180
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03833
published_at 2026-04-18T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03824
published_at 2026-04-16T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.0383
published_at 2026-04-01T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03868
published_at 2026-04-02T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03878
published_at 2026-04-04T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03892
published_at 2026-04-07T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03897
published_at 2026-04-08T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.03922
published_at 2026-04-09T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.0389
published_at 2026-04-11T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.03871
published_at 2026-04-12T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.03845
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2180
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2180
2
reference_url https://source.android.com/security/bulletin/2019-09-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/2019-09-01
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957
reference_id 934957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2180
reference_id CVE-2019-2180
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2180
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2019-2180
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qxwq-vp9g-ukca
29
url VCID-ucmb-we3r-aqcd
vulnerability_id VCID-ucmb-we3r-aqcd
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1159
reference_id
reference_type
scores
0
value 0.58776
scoring_system epss
scoring_elements 0.98202
published_at 2026-04-01T12:55:00Z
1
value 0.58776
scoring_system epss
scoring_elements 0.98206
published_at 2026-04-02T12:55:00Z
2
value 0.58776
scoring_system epss
scoring_elements 0.9821
published_at 2026-04-04T12:55:00Z
3
value 0.58776
scoring_system epss
scoring_elements 0.98211
published_at 2026-04-07T12:55:00Z
4
value 0.58776
scoring_system epss
scoring_elements 0.98216
published_at 2026-04-09T12:55:00Z
5
value 0.58776
scoring_system epss
scoring_elements 0.9822
published_at 2026-04-11T12:55:00Z
6
value 0.58776
scoring_system epss
scoring_elements 0.98219
published_at 2026-04-13T12:55:00Z
7
value 0.58776
scoring_system epss
scoring_elements 0.98225
published_at 2026-04-16T12:55:00Z
8
value 0.58776
scoring_system epss
scoring_elements 0.98227
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1159
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1221642
reference_id 1221642
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1221642
5
reference_url https://security.gentoo.org/glsa/201510-07
reference_id GLSA-201510-07
reference_type
scores
url https://security.gentoo.org/glsa/201510-07
6
reference_url https://access.redhat.com/errata/RHSA-2015:1123
reference_id RHSA-2015:1123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1123
7
reference_url https://usn.ubuntu.com/2629-1/
reference_id USN-2629-1
reference_type
scores
url https://usn.ubuntu.com/2629-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
1
url pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2
purl pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3ame-feez-yqhc
2
vulnerability VCID-3etj-2m21-ffa1
3
vulnerability VCID-44ju-8618-vqht
4
vulnerability VCID-6mus-21kz-uuhz
5
vulnerability VCID-7wg4-sc9v-bffk
6
vulnerability VCID-993k-m3sq-gufu
7
vulnerability VCID-am36-6m5v-fkba
8
vulnerability VCID-apyh-1uza-pffa
9
vulnerability VCID-aznw-8yer-xfhf
10
vulnerability VCID-bzht-vhe3-y7bf
11
vulnerability VCID-ev9c-v5dv-37fb
12
vulnerability VCID-fkyp-m1p9-mfhy
13
vulnerability VCID-k4yw-jg6v-1bcc
14
vulnerability VCID-p8gy-dd3u-uqh4
15
vulnerability VCID-pwkd-sgtt-1bef
16
vulnerability VCID-q8a8-fd7r-1kg7
17
vulnerability VCID-qxwq-vp9g-ukca
18
vulnerability VCID-ucmb-we3r-aqcd
19
vulnerability VCID-vx54-r2dt-8ue5
20
vulnerability VCID-w17y-dvuq-7ba6
21
vulnerability VCID-wqu4-wys6-hfbb
22
vulnerability VCID-zjj3-g2d7-c3gd
23
vulnerability VCID-zt43-htwu-kfde
24
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2
2
url pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1
purl pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-6mus-21kz-uuhz
4
vulnerability VCID-7wg4-sc9v-bffk
5
vulnerability VCID-993k-m3sq-gufu
6
vulnerability VCID-am36-6m5v-fkba
7
vulnerability VCID-apyh-1uza-pffa
8
vulnerability VCID-aznw-8yer-xfhf
9
vulnerability VCID-bzht-vhe3-y7bf
10
vulnerability VCID-ev9c-v5dv-37fb
11
vulnerability VCID-fkyp-m1p9-mfhy
12
vulnerability VCID-k4yw-jg6v-1bcc
13
vulnerability VCID-p8gy-dd3u-uqh4
14
vulnerability VCID-pwkd-sgtt-1bef
15
vulnerability VCID-q8a8-fd7r-1kg7
16
vulnerability VCID-qxwq-vp9g-ukca
17
vulnerability VCID-vx54-r2dt-8ue5
18
vulnerability VCID-w17y-dvuq-7ba6
19
vulnerability VCID-wqu4-wys6-hfbb
20
vulnerability VCID-zjj3-g2d7-c3gd
21
vulnerability VCID-zt43-htwu-kfde
22
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1
aliases CVE-2015-1159
risk_score 0.2
exploitability 0.5
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ucmb-we3r-aqcd
30
url VCID-ukec-69r2-xbef
vulnerability_id VCID-ukec-69r2-xbef
summary
A buffer overflow in CUPS might allow remote attackers to execute
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9679
reference_id
reference_type
scores
0
value 0.07364
scoring_system epss
scoring_elements 0.9173
published_at 2026-04-18T12:55:00Z
1
value 0.07364
scoring_system epss
scoring_elements 0.91673
published_at 2026-04-01T12:55:00Z
2
value 0.07364
scoring_system epss
scoring_elements 0.91682
published_at 2026-04-02T12:55:00Z
3
value 0.07364
scoring_system epss
scoring_elements 0.91687
published_at 2026-04-04T12:55:00Z
4
value 0.07364
scoring_system epss
scoring_elements 0.91696
published_at 2026-04-07T12:55:00Z
5
value 0.07364
scoring_system epss
scoring_elements 0.91709
published_at 2026-04-08T12:55:00Z
6
value 0.07364
scoring_system epss
scoring_elements 0.91715
published_at 2026-04-09T12:55:00Z
7
value 0.07364
scoring_system epss
scoring_elements 0.91719
published_at 2026-04-11T12:55:00Z
8
value 0.07364
scoring_system epss
scoring_elements 0.91721
published_at 2026-04-12T12:55:00Z
9
value 0.07364
scoring_system epss
scoring_elements 0.91717
published_at 2026-04-13T12:55:00Z
10
value 0.07364
scoring_system epss
scoring_elements 0.91738
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9679
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191588
reference_id 1191588
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191588
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387
reference_id 778387
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387
6
reference_url https://security.gentoo.org/glsa/201607-06
reference_id GLSA-201607-06
reference_type
scores
url https://security.gentoo.org/glsa/201607-06
7
reference_url https://access.redhat.com/errata/RHSA-2015:1123
reference_id RHSA-2015:1123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1123
8
reference_url https://usn.ubuntu.com/2520-1/
reference_id USN-2520-1
reference_type
scores
url https://usn.ubuntu.com/2520-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
1
url pkg:deb/debian/cups@1.7.5-11
purl pkg:deb/debian/cups@1.7.5-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3ame-feez-yqhc
2
vulnerability VCID-3etj-2m21-ffa1
3
vulnerability VCID-44ju-8618-vqht
4
vulnerability VCID-6mus-21kz-uuhz
5
vulnerability VCID-7wg4-sc9v-bffk
6
vulnerability VCID-993k-m3sq-gufu
7
vulnerability VCID-am36-6m5v-fkba
8
vulnerability VCID-apyh-1uza-pffa
9
vulnerability VCID-aznw-8yer-xfhf
10
vulnerability VCID-bzht-vhe3-y7bf
11
vulnerability VCID-ev9c-v5dv-37fb
12
vulnerability VCID-fkyp-m1p9-mfhy
13
vulnerability VCID-k4yw-jg6v-1bcc
14
vulnerability VCID-p8gy-dd3u-uqh4
15
vulnerability VCID-pwkd-sgtt-1bef
16
vulnerability VCID-q8a8-fd7r-1kg7
17
vulnerability VCID-qxwq-vp9g-ukca
18
vulnerability VCID-ucmb-we3r-aqcd
19
vulnerability VCID-vx54-r2dt-8ue5
20
vulnerability VCID-w17y-dvuq-7ba6
21
vulnerability VCID-wqu4-wys6-hfbb
22
vulnerability VCID-zjj3-g2d7-c3gd
23
vulnerability VCID-zt43-htwu-kfde
24
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11
aliases CVE-2014-9679
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ukec-69r2-xbef
31
url VCID-vx54-r2dt-8ue5
vulnerability_id VCID-vx54-r2dt-8ue5
summary Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4504
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10426
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10307
published_at 2026-04-18T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10494
published_at 2026-04-04T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10354
published_at 2026-04-07T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10427
published_at 2026-04-08T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10491
published_at 2026-04-09T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10522
published_at 2026-04-11T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10489
published_at 2026-04-12T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10466
published_at 2026-04-13T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10334
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4504
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238509
reference_id 2238509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238509
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/
reference_id 5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/
reference_id 5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/
reference_id AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/
8
reference_url https://takeonme.org/cves/CVE-2023-4504.html
reference_id CVE-2023-4504.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://takeonme.org/cves/CVE-2023-4504.html
9
reference_url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6
reference_id GHSA-4f65-6ph5-qwh6
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6
10
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h
reference_id GHSA-pf5r-86w9-678h
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h
11
reference_url https://security.gentoo.org/glsa/202402-17
reference_id GLSA-202402-17
reference_type
scores
url https://security.gentoo.org/glsa/202402-17
12
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/
reference_id PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/
reference_id T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/
15
reference_url https://usn.ubuntu.com/6391-1/
reference_id USN-6391-1
reference_type
scores
url https://usn.ubuntu.com/6391-1/
16
reference_url https://usn.ubuntu.com/6391-2/
reference_id USN-6391-2
reference_type
scores
url https://usn.ubuntu.com/6391-2/
17
reference_url https://usn.ubuntu.com/6392-1/
reference_id USN-6392-1
reference_type
scores
url https://usn.ubuntu.com/6392-1/
18
reference_url https://github.com/OpenPrinting/cups/releases/tag/v2.4.7
reference_id v2.4.7
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://github.com/OpenPrinting/cups/releases/tag/v2.4.7
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2023-4504
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vx54-r2dt-8ue5
32
url VCID-w17y-dvuq-7ba6
vulnerability_id VCID-w17y-dvuq-7ba6
summary
Multiple vulnerabilities have been found in CUPS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-4181
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.27942
published_at 2026-04-18T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.27951
published_at 2026-04-13T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.27959
published_at 2026-04-16T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39331
published_at 2026-04-01T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.39493
published_at 2026-04-02T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39517
published_at 2026-04-04T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39431
published_at 2026-04-07T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39486
published_at 2026-04-08T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39501
published_at 2026-04-09T12:55:00Z
9
value 0.00179
scoring_system epss
scoring_elements 0.39512
published_at 2026-04-11T12:55:00Z
10
value 0.00179
scoring_system epss
scoring_elements 0.39474
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-4181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
8
reference_url https://support.apple.com/HT208849
reference_id
reference_type
scores
url https://support.apple.com/HT208849
9
reference_url https://www.debian.org/security/2018/dsa-4243
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4243
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1607291
reference_id 1607291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1607291
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-4181
reference_id CVE-2018-4181
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:N/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-4181
19
reference_url https://security.gentoo.org/glsa/201908-08
reference_id GLSA-201908-08
reference_type
scores
url https://security.gentoo.org/glsa/201908-08
20
reference_url https://access.redhat.com/errata/RHSA-2020:1050
reference_id RHSA-2020:1050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1050
21
reference_url https://usn.ubuntu.com/3713-1/
reference_id USN-3713-1
reference_type
scores
url https://usn.ubuntu.com/3713-1/
fixed_packages
0
url pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
purl pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-6mus-21kz-uuhz
4
vulnerability VCID-7wg4-sc9v-bffk
5
vulnerability VCID-993k-m3sq-gufu
6
vulnerability VCID-am36-6m5v-fkba
7
vulnerability VCID-apyh-1uza-pffa
8
vulnerability VCID-aznw-8yer-xfhf
9
vulnerability VCID-bzht-vhe3-y7bf
10
vulnerability VCID-ev9c-v5dv-37fb
11
vulnerability VCID-fkyp-m1p9-mfhy
12
vulnerability VCID-k4yw-jg6v-1bcc
13
vulnerability VCID-p8gy-dd3u-uqh4
14
vulnerability VCID-pwkd-sgtt-1bef
15
vulnerability VCID-q8a8-fd7r-1kg7
16
vulnerability VCID-qxwq-vp9g-ukca
17
vulnerability VCID-vx54-r2dt-8ue5
18
vulnerability VCID-w17y-dvuq-7ba6
19
vulnerability VCID-wqu4-wys6-hfbb
20
vulnerability VCID-zjj3-g2d7-c3gd
21
vulnerability VCID-zt43-htwu-kfde
22
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6
1
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2018-4181
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w17y-dvuq-7ba6
33
url VCID-wjht-u5u1-kkas
vulnerability_id VCID-wjht-u5u1-kkas
summary cups: lppasswd vulnerability allows data access to unprivileged user
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6891.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6891.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6891
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.1417
published_at 2026-04-01T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14244
published_at 2026-04-02T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14305
published_at 2026-04-04T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14116
published_at 2026-04-07T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14197
published_at 2026-04-11T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14251
published_at 2026-04-09T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14155
published_at 2026-04-12T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14098
published_at 2026-04-13T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.13989
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6891
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6891
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1051645
reference_id 1051645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1051645
4
reference_url https://usn.ubuntu.com/2082-1/
reference_id USN-2082-1
reference_type
scores
url https://usn.ubuntu.com/2082-1/
fixed_packages
0
url pkg:deb/debian/cups@1.7.5-11
purl pkg:deb/debian/cups@1.7.5-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3ame-feez-yqhc
2
vulnerability VCID-3etj-2m21-ffa1
3
vulnerability VCID-44ju-8618-vqht
4
vulnerability VCID-6mus-21kz-uuhz
5
vulnerability VCID-7wg4-sc9v-bffk
6
vulnerability VCID-993k-m3sq-gufu
7
vulnerability VCID-am36-6m5v-fkba
8
vulnerability VCID-apyh-1uza-pffa
9
vulnerability VCID-aznw-8yer-xfhf
10
vulnerability VCID-bzht-vhe3-y7bf
11
vulnerability VCID-ev9c-v5dv-37fb
12
vulnerability VCID-fkyp-m1p9-mfhy
13
vulnerability VCID-k4yw-jg6v-1bcc
14
vulnerability VCID-p8gy-dd3u-uqh4
15
vulnerability VCID-pwkd-sgtt-1bef
16
vulnerability VCID-q8a8-fd7r-1kg7
17
vulnerability VCID-qxwq-vp9g-ukca
18
vulnerability VCID-ucmb-we3r-aqcd
19
vulnerability VCID-vx54-r2dt-8ue5
20
vulnerability VCID-w17y-dvuq-7ba6
21
vulnerability VCID-wqu4-wys6-hfbb
22
vulnerability VCID-zjj3-g2d7-c3gd
23
vulnerability VCID-zt43-htwu-kfde
24
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11
aliases CVE-2013-6891
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjht-u5u1-kkas
34
url VCID-wqu4-wys6-hfbb
vulnerability_id VCID-wqu4-wys6-hfbb
summary cups: stack-buffer-overflow in libcups's asn1_get_type function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8675.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8675.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-8675
reference_id
reference_type
scores
0
value 0.01419
scoring_system epss
scoring_elements 0.80524
published_at 2026-04-01T12:55:00Z
1
value 0.01419
scoring_system epss
scoring_elements 0.80531
published_at 2026-04-02T12:55:00Z
2
value 0.01419
scoring_system epss
scoring_elements 0.80553
published_at 2026-04-04T12:55:00Z
3
value 0.01419
scoring_system epss
scoring_elements 0.80545
published_at 2026-04-07T12:55:00Z
4
value 0.01419
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-08T12:55:00Z
5
value 0.01419
scoring_system epss
scoring_elements 0.80584
published_at 2026-04-09T12:55:00Z
6
value 0.01419
scoring_system epss
scoring_elements 0.80601
published_at 2026-04-11T12:55:00Z
7
value 0.01419
scoring_system epss
scoring_elements 0.80587
published_at 2026-04-12T12:55:00Z
8
value 0.01419
scoring_system epss
scoring_elements 0.80579
published_at 2026-04-13T12:55:00Z
9
value 0.01419
scoring_system epss
scoring_elements 0.80607
published_at 2026-04-16T12:55:00Z
10
value 0.01419
scoring_system epss
scoring_elements 0.8061
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-8675
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1738455
reference_id 1738455
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1738455
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957
reference_id 934957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957
6
reference_url https://access.redhat.com/errata/RHSA-2020:1765
reference_id RHSA-2020:1765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1765
7
reference_url https://access.redhat.com/errata/RHSA-2020:3864
reference_id RHSA-2020:3864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3864
8
reference_url https://usn.ubuntu.com/4105-1/
reference_id USN-4105-1
reference_type
scores
url https://usn.ubuntu.com/4105-1/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2019-8675
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqu4-wys6-hfbb
35
url VCID-y7a9-2p1n-z7fx
vulnerability_id VCID-y7a9-2p1n-z7fx
summary
Multiple vulnerabilities have been found in GIMP, the worst of
    which allow execution of arbitrary code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2896.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2896.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2896
reference_id
reference_type
scores
0
value 0.07216
scoring_system epss
scoring_elements 0.9157
published_at 2026-04-01T12:55:00Z
1
value 0.07216
scoring_system epss
scoring_elements 0.91578
published_at 2026-04-02T12:55:00Z
2
value 0.07216
scoring_system epss
scoring_elements 0.91584
published_at 2026-04-04T12:55:00Z
3
value 0.07216
scoring_system epss
scoring_elements 0.91593
published_at 2026-04-07T12:55:00Z
4
value 0.07216
scoring_system epss
scoring_elements 0.91606
published_at 2026-04-08T12:55:00Z
5
value 0.07216
scoring_system epss
scoring_elements 0.91612
published_at 2026-04-09T12:55:00Z
6
value 0.07216
scoring_system epss
scoring_elements 0.91616
published_at 2026-04-11T12:55:00Z
7
value 0.07216
scoring_system epss
scoring_elements 0.91618
published_at 2026-04-12T12:55:00Z
8
value 0.07216
scoring_system epss
scoring_elements 0.91615
published_at 2026-04-13T12:55:00Z
9
value 0.07216
scoring_system epss
scoring_elements 0.91637
published_at 2026-04-16T12:55:00Z
10
value 0.07216
scoring_system epss
scoring_elements 0.9163
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2896
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643753
reference_id 643753
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643753
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=727800
reference_id 727800
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=727800
5
reference_url https://security.gentoo.org/glsa/201209-23
reference_id GLSA-201209-23
reference_type
scores
url https://security.gentoo.org/glsa/201209-23
6
reference_url https://access.redhat.com/errata/RHSA-2011:1635
reference_id RHSA-2011:1635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1635
7
reference_url https://access.redhat.com/errata/RHSA-2012:0302
reference_id RHSA-2012:0302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0302
8
reference_url https://access.redhat.com/errata/RHSA-2012:1180
reference_id RHSA-2012:1180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1180
9
reference_url https://access.redhat.com/errata/RHSA-2012:1181
reference_id RHSA-2012:1181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1181
10
reference_url https://usn.ubuntu.com/1207-1/
reference_id USN-1207-1
reference_type
scores
url https://usn.ubuntu.com/1207-1/
11
reference_url https://usn.ubuntu.com/1214-1/
reference_id USN-1214-1
reference_type
scores
url https://usn.ubuntu.com/1214-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
aliases CVE-2011-2896
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y7a9-2p1n-z7fx
36
url VCID-yyrd-qt22-w3f5
vulnerability_id VCID-yyrd-qt22-w3f5
summary security update
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0313.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0313.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2014-1388.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1388.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5031
reference_id
reference_type
scores
0
value 0.01618
scoring_system epss
scoring_elements 0.81845
published_at 2026-04-18T12:55:00Z
1
value 0.01618
scoring_system epss
scoring_elements 0.81742
published_at 2026-04-01T12:55:00Z
2
value 0.01618
scoring_system epss
scoring_elements 0.81752
published_at 2026-04-02T12:55:00Z
3
value 0.01618
scoring_system epss
scoring_elements 0.81775
published_at 2026-04-04T12:55:00Z
4
value 0.01618
scoring_system epss
scoring_elements 0.81772
published_at 2026-04-07T12:55:00Z
5
value 0.01618
scoring_system epss
scoring_elements 0.81799
published_at 2026-04-08T12:55:00Z
6
value 0.01618
scoring_system epss
scoring_elements 0.81805
published_at 2026-04-09T12:55:00Z
7
value 0.01618
scoring_system epss
scoring_elements 0.81825
published_at 2026-04-11T12:55:00Z
8
value 0.01618
scoring_system epss
scoring_elements 0.81812
published_at 2026-04-12T12:55:00Z
9
value 0.01618
scoring_system epss
scoring_elements 0.81807
published_at 2026-04-13T12:55:00Z
10
value 0.01618
scoring_system epss
scoring_elements 0.81844
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5031
4
reference_url https://cups.org/str.php?L4455
reference_id
reference_type
scores
url https://cups.org/str.php?L4455
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031
9
reference_url http://secunia.com/advisories/60509
reference_id
reference_type
scores
url http://secunia.com/advisories/60509
10
reference_url http://secunia.com/advisories/60787
reference_id
reference_type
scores
url http://secunia.com/advisories/60787
11
reference_url http://www.debian.org/security/2014/dsa-2990
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2990
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
13
reference_url http://www.openwall.com/lists/oss-security/2014/07/22/13
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/07/22/13
14
reference_url http://www.openwall.com/lists/oss-security/2014/07/22/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/07/22/2
15
reference_url http://www.ubuntu.com/usn/USN-2341-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2341-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1128767
reference_id 1128767
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1128767
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5031
reference_id CVE-2014-5031
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-5031
28
reference_url https://access.redhat.com/errata/RHSA-2014:1388
reference_id RHSA-2014:1388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1388
29
reference_url https://usn.ubuntu.com/2341-1/
reference_id USN-2341-1
reference_type
scores
url https://usn.ubuntu.com/2341-1/
fixed_packages
0
url pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
purl pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-3ame-feez-yqhc
3
vulnerability VCID-3etj-2m21-ffa1
4
vulnerability VCID-44ju-8618-vqht
5
vulnerability VCID-6mus-21kz-uuhz
6
vulnerability VCID-7wg4-sc9v-bffk
7
vulnerability VCID-993k-m3sq-gufu
8
vulnerability VCID-am36-6m5v-fkba
9
vulnerability VCID-anr5-gc12-e7dr
10
vulnerability VCID-apyh-1uza-pffa
11
vulnerability VCID-aznw-8yer-xfhf
12
vulnerability VCID-bzht-vhe3-y7bf
13
vulnerability VCID-cf81-58ju-bqaz
14
vulnerability VCID-ev9c-v5dv-37fb
15
vulnerability VCID-fby6-8f6z-63fw
16
vulnerability VCID-fkyp-m1p9-mfhy
17
vulnerability VCID-k4yw-jg6v-1bcc
18
vulnerability VCID-p8gy-dd3u-uqh4
19
vulnerability VCID-pwkd-sgtt-1bef
20
vulnerability VCID-q8a8-fd7r-1kg7
21
vulnerability VCID-qxwq-vp9g-ukca
22
vulnerability VCID-ucmb-we3r-aqcd
23
vulnerability VCID-ukec-69r2-xbef
24
vulnerability VCID-vx54-r2dt-8ue5
25
vulnerability VCID-w17y-dvuq-7ba6
26
vulnerability VCID-wjht-u5u1-kkas
27
vulnerability VCID-wqu4-wys6-hfbb
28
vulnerability VCID-yyrd-qt22-w3f5
29
vulnerability VCID-zjj3-g2d7-c3gd
30
vulnerability VCID-zt43-htwu-kfde
31
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6
1
url pkg:deb/debian/cups@1.7.5-11
purl pkg:deb/debian/cups@1.7.5-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3ame-feez-yqhc
2
vulnerability VCID-3etj-2m21-ffa1
3
vulnerability VCID-44ju-8618-vqht
4
vulnerability VCID-6mus-21kz-uuhz
5
vulnerability VCID-7wg4-sc9v-bffk
6
vulnerability VCID-993k-m3sq-gufu
7
vulnerability VCID-am36-6m5v-fkba
8
vulnerability VCID-apyh-1uza-pffa
9
vulnerability VCID-aznw-8yer-xfhf
10
vulnerability VCID-bzht-vhe3-y7bf
11
vulnerability VCID-ev9c-v5dv-37fb
12
vulnerability VCID-fkyp-m1p9-mfhy
13
vulnerability VCID-k4yw-jg6v-1bcc
14
vulnerability VCID-p8gy-dd3u-uqh4
15
vulnerability VCID-pwkd-sgtt-1bef
16
vulnerability VCID-q8a8-fd7r-1kg7
17
vulnerability VCID-qxwq-vp9g-ukca
18
vulnerability VCID-ucmb-we3r-aqcd
19
vulnerability VCID-vx54-r2dt-8ue5
20
vulnerability VCID-w17y-dvuq-7ba6
21
vulnerability VCID-wqu4-wys6-hfbb
22
vulnerability VCID-zjj3-g2d7-c3gd
23
vulnerability VCID-zt43-htwu-kfde
24
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11
aliases CVE-2014-5031
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yyrd-qt22-w3f5
37
url VCID-zjj3-g2d7-c3gd
vulnerability_id VCID-zjj3-g2d7-c3gd
summary
Multiple vulnerabilities have been found in CUPS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15400
reference_id
reference_type
scores
0
value 0.00411
scoring_system epss
scoring_elements 0.6126
published_at 2026-04-01T12:55:00Z
1
value 0.00411
scoring_system epss
scoring_elements 0.6134
published_at 2026-04-02T12:55:00Z
2
value 0.00411
scoring_system epss
scoring_elements 0.61369
published_at 2026-04-04T12:55:00Z
3
value 0.00411
scoring_system epss
scoring_elements 0.61338
published_at 2026-04-07T12:55:00Z
4
value 0.00411
scoring_system epss
scoring_elements 0.61385
published_at 2026-04-08T12:55:00Z
5
value 0.00411
scoring_system epss
scoring_elements 0.61401
published_at 2026-04-09T12:55:00Z
6
value 0.00411
scoring_system epss
scoring_elements 0.61422
published_at 2026-04-11T12:55:00Z
7
value 0.00411
scoring_system epss
scoring_elements 0.61407
published_at 2026-04-12T12:55:00Z
8
value 0.00411
scoring_system epss
scoring_elements 0.61388
published_at 2026-04-13T12:55:00Z
9
value 0.00411
scoring_system epss
scoring_elements 0.61427
published_at 2026-04-16T12:55:00Z
10
value 0.00411
scoring_system epss
scoring_elements 0.61431
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15400
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1607288
reference_id 1607288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1607288
8
reference_url https://security.gentoo.org/glsa/201908-08
reference_id GLSA-201908-08
reference_type
scores
url https://security.gentoo.org/glsa/201908-08
fixed_packages
0
url pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
purl pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-6mus-21kz-uuhz
4
vulnerability VCID-7wg4-sc9v-bffk
5
vulnerability VCID-993k-m3sq-gufu
6
vulnerability VCID-am36-6m5v-fkba
7
vulnerability VCID-apyh-1uza-pffa
8
vulnerability VCID-aznw-8yer-xfhf
9
vulnerability VCID-bzht-vhe3-y7bf
10
vulnerability VCID-ev9c-v5dv-37fb
11
vulnerability VCID-fkyp-m1p9-mfhy
12
vulnerability VCID-k4yw-jg6v-1bcc
13
vulnerability VCID-p8gy-dd3u-uqh4
14
vulnerability VCID-pwkd-sgtt-1bef
15
vulnerability VCID-q8a8-fd7r-1kg7
16
vulnerability VCID-qxwq-vp9g-ukca
17
vulnerability VCID-vx54-r2dt-8ue5
18
vulnerability VCID-w17y-dvuq-7ba6
19
vulnerability VCID-wqu4-wys6-hfbb
20
vulnerability VCID-zjj3-g2d7-c3gd
21
vulnerability VCID-zt43-htwu-kfde
22
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6
1
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2017-15400
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zjj3-g2d7-c3gd
38
url VCID-zt43-htwu-kfde
vulnerability_id VCID-zt43-htwu-kfde
summary
Multiple vulnerabilities have been found in CUPS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6553
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.34985
published_at 2026-04-01T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35183
published_at 2026-04-02T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35212
published_at 2026-04-04T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35093
published_at 2026-04-07T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35137
published_at 2026-04-08T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35163
published_at 2026-04-09T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35168
published_at 2026-04-11T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35133
published_at 2026-04-12T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35108
published_at 2026-04-13T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35145
published_at 2026-04-16T12:55:00Z
10
value 0.00147
scoring_system epss
scoring_elements 0.35131
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1607285
reference_id 1607285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1607285
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605
reference_id 903605
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605
8
reference_url https://security.gentoo.org/glsa/201908-08
reference_id GLSA-201908-08
reference_type
scores
url https://security.gentoo.org/glsa/201908-08
9
reference_url https://usn.ubuntu.com/3713-1/
reference_id USN-3713-1
reference_type
scores
url https://usn.ubuntu.com/3713-1/
fixed_packages
0
url pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
purl pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-6mus-21kz-uuhz
4
vulnerability VCID-7wg4-sc9v-bffk
5
vulnerability VCID-993k-m3sq-gufu
6
vulnerability VCID-am36-6m5v-fkba
7
vulnerability VCID-apyh-1uza-pffa
8
vulnerability VCID-aznw-8yer-xfhf
9
vulnerability VCID-bzht-vhe3-y7bf
10
vulnerability VCID-ev9c-v5dv-37fb
11
vulnerability VCID-fkyp-m1p9-mfhy
12
vulnerability VCID-k4yw-jg6v-1bcc
13
vulnerability VCID-p8gy-dd3u-uqh4
14
vulnerability VCID-pwkd-sgtt-1bef
15
vulnerability VCID-q8a8-fd7r-1kg7
16
vulnerability VCID-qxwq-vp9g-ukca
17
vulnerability VCID-vx54-r2dt-8ue5
18
vulnerability VCID-w17y-dvuq-7ba6
19
vulnerability VCID-wqu4-wys6-hfbb
20
vulnerability VCID-zjj3-g2d7-c3gd
21
vulnerability VCID-zt43-htwu-kfde
22
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6
1
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2018-6553
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zt43-htwu-kfde
39
url VCID-zxp7-6d69-tfhm
vulnerability_id VCID-zxp7-6d69-tfhm
summary cups: stack-buffer-overflow in libcups's asn1_get_packed function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8696.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-8696
reference_id
reference_type
scores
0
value 0.01419
scoring_system epss
scoring_elements 0.80524
published_at 2026-04-01T12:55:00Z
1
value 0.01419
scoring_system epss
scoring_elements 0.80531
published_at 2026-04-02T12:55:00Z
2
value 0.01419
scoring_system epss
scoring_elements 0.80553
published_at 2026-04-04T12:55:00Z
3
value 0.01419
scoring_system epss
scoring_elements 0.80545
published_at 2026-04-07T12:55:00Z
4
value 0.01419
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-08T12:55:00Z
5
value 0.01419
scoring_system epss
scoring_elements 0.80584
published_at 2026-04-09T12:55:00Z
6
value 0.01419
scoring_system epss
scoring_elements 0.80601
published_at 2026-04-11T12:55:00Z
7
value 0.01419
scoring_system epss
scoring_elements 0.80587
published_at 2026-04-12T12:55:00Z
8
value 0.01419
scoring_system epss
scoring_elements 0.80579
published_at 2026-04-13T12:55:00Z
9
value 0.01419
scoring_system epss
scoring_elements 0.80607
published_at 2026-04-16T12:55:00Z
10
value 0.01419
scoring_system epss
scoring_elements 0.8061
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-8696
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1738497
reference_id 1738497
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1738497
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957
reference_id 934957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957
6
reference_url https://access.redhat.com/errata/RHSA-2020:1765
reference_id RHSA-2020:1765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1765
7
reference_url https://access.redhat.com/errata/RHSA-2020:3864
reference_id RHSA-2020:3864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3864
8
reference_url https://usn.ubuntu.com/4105-1/
reference_id USN-4105-1
reference_type
scores
url https://usn.ubuntu.com/4105-1/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2019-8696
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxp7-6d69-tfhm
Fixing_vulnerabilities
0
url VCID-2weh-q66p-8bdg
vulnerability_id VCID-2weh-q66p-8bdg
summary
Multiple vulnerabilities have been found in CUPS, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0302.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0302.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0302
reference_id
reference_type
scores
0
value 0.0529
scoring_system epss
scoring_elements 0.8997
published_at 2026-04-01T12:55:00Z
1
value 0.0529
scoring_system epss
scoring_elements 0.89973
published_at 2026-04-02T12:55:00Z
2
value 0.0529
scoring_system epss
scoring_elements 0.89985
published_at 2026-04-04T12:55:00Z
3
value 0.0529
scoring_system epss
scoring_elements 0.8999
published_at 2026-04-07T12:55:00Z
4
value 0.0529
scoring_system epss
scoring_elements 0.90006
published_at 2026-04-08T12:55:00Z
5
value 0.0529
scoring_system epss
scoring_elements 0.90012
published_at 2026-04-13T12:55:00Z
6
value 0.0529
scoring_system epss
scoring_elements 0.9002
published_at 2026-04-11T12:55:00Z
7
value 0.0529
scoring_system epss
scoring_elements 0.90018
published_at 2026-04-12T12:55:00Z
8
value 0.0529
scoring_system epss
scoring_elements 0.90028
published_at 2026-04-16T12:55:00Z
9
value 0.0529
scoring_system epss
scoring_elements 0.90029
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0302
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0302
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=557775
reference_id 557775
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=557775
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572940
reference_id 572940
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572940
5
reference_url https://security.gentoo.org/glsa/201207-10
reference_id GLSA-201207-10
reference_type
scores
url https://security.gentoo.org/glsa/201207-10
6
reference_url https://access.redhat.com/errata/RHSA-2010:0129
reference_id RHSA-2010:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0129
7
reference_url https://usn.ubuntu.com/906-1/
reference_id USN-906-1
reference_type
scores
url https://usn.ubuntu.com/906-1/
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2010-0302
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2weh-q66p-8bdg
1
url VCID-4he8-q3nc-3bf7
vulnerability_id VCID-4he8-q3nc-3bf7
summary
Multiple errors in CUPS might allow for the remote execution of arbitrary
    code or DNS rebinding attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0163.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0163.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0163
reference_id
reference_type
scores
0
value 0.0495
scoring_system epss
scoring_elements 0.89611
published_at 2026-04-01T12:55:00Z
1
value 0.0495
scoring_system epss
scoring_elements 0.89614
published_at 2026-04-02T12:55:00Z
2
value 0.0495
scoring_system epss
scoring_elements 0.89628
published_at 2026-04-04T12:55:00Z
3
value 0.0495
scoring_system epss
scoring_elements 0.89629
published_at 2026-04-07T12:55:00Z
4
value 0.0495
scoring_system epss
scoring_elements 0.89645
published_at 2026-04-08T12:55:00Z
5
value 0.0495
scoring_system epss
scoring_elements 0.89651
published_at 2026-04-09T12:55:00Z
6
value 0.0495
scoring_system epss
scoring_elements 0.89658
published_at 2026-04-11T12:55:00Z
7
value 0.0495
scoring_system epss
scoring_elements 0.89656
published_at 2026-04-12T12:55:00Z
8
value 0.0495
scoring_system epss
scoring_elements 0.8965
published_at 2026-04-13T12:55:00Z
9
value 0.0495
scoring_system epss
scoring_elements 0.89665
published_at 2026-04-16T12:55:00Z
10
value 0.0495
scoring_system epss
scoring_elements 0.89666
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0163
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490596
reference_id 490596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490596
4
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
5
reference_url https://access.redhat.com/errata/RHSA-2009:0428
reference_id RHSA-2009:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0428
6
reference_url https://access.redhat.com/errata/RHSA-2009:0429
reference_id RHSA-2009:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0429
7
reference_url https://usn.ubuntu.com/760-1/
reference_id USN-760-1
reference_type
scores
url https://usn.ubuntu.com/760-1/
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2009-0163
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4he8-q3nc-3bf7
2
url VCID-7gbc-682w-5fdq
vulnerability_id VCID-7gbc-682w-5fdq
summary
Multiple vulnerabilities have been found in CUPS, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://cups.org/articles.php?L596
reference_id
reference_type
scores
url http://cups.org/articles.php?L596
1
reference_url http://cups.org/str.php?L3498
reference_id
reference_type
scores
url http://cups.org/str.php?L3498
2
reference_url http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0540.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0540.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0540
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60813
published_at 2026-04-18T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60643
published_at 2026-04-01T12:55:00Z
2
value 0.00401
scoring_system epss
scoring_elements 0.60717
published_at 2026-04-02T12:55:00Z
3
value 0.00401
scoring_system epss
scoring_elements 0.60747
published_at 2026-04-04T12:55:00Z
4
value 0.00401
scoring_system epss
scoring_elements 0.60713
published_at 2026-04-07T12:55:00Z
5
value 0.00401
scoring_system epss
scoring_elements 0.60761
published_at 2026-04-08T12:55:00Z
6
value 0.00401
scoring_system epss
scoring_elements 0.60776
published_at 2026-04-09T12:55:00Z
7
value 0.00401
scoring_system epss
scoring_elements 0.60798
published_at 2026-04-11T12:55:00Z
8
value 0.00401
scoring_system epss
scoring_elements 0.60784
published_at 2026-04-12T12:55:00Z
9
value 0.00401
scoring_system epss
scoring_elements 0.60765
published_at 2026-04-13T12:55:00Z
10
value 0.00401
scoring_system epss
scoring_elements 0.60807
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0540
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0540
6
reference_url http://secunia.com/advisories/40220
reference_id
reference_type
scores
url http://secunia.com/advisories/40220
7
reference_url http://secunia.com/advisories/43521
reference_id
reference_type
scores
url http://secunia.com/advisories/43521
8
reference_url http://security.gentoo.org/glsa/glsa-201207-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201207-10.xml
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10382
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10382
10
reference_url http://support.apple.com/kb/HT4188
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4188
11
reference_url http://www.debian.org/security/2011/dsa-2176
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2176
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:233
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:233
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
15
reference_url http://www.securityfocus.com/bid/40871
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40871
16
reference_url http://www.securitytracker.com/id?1024122
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024122
17
reference_url http://www.vupen.com/english/advisories/2010/1481
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1481
18
reference_url http://www.vupen.com/english/advisories/2011/0535
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0535
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=588805
reference_id 588805
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=588805
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-0540
reference_id CVE-2010-0540
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-0540
31
reference_url https://security.gentoo.org/glsa/201207-10
reference_id GLSA-201207-10
reference_type
scores
url https://security.gentoo.org/glsa/201207-10
32
reference_url https://access.redhat.com/errata/RHSA-2010:0490
reference_id RHSA-2010:0490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0490
33
reference_url https://usn.ubuntu.com/952-1/
reference_id USN-952-1
reference_type
scores
url https://usn.ubuntu.com/952-1/
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2010-0540
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7gbc-682w-5fdq
3
url VCID-8yv6-g189-vugt
vulnerability_id VCID-8yv6-g189-vugt
summary cups: DoS (daemon crash) caused by the large number of subscriptions
references
0
reference_url http://lab.gnucitizen.org/projects/cups-0day
reference_id
reference_type
scores
url http://lab.gnucitizen.org/projects/cups-0day
1
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5183.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5183.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5183
reference_id
reference_type
scores
0
value 0.04639
scoring_system epss
scoring_elements 0.89302
published_at 2026-04-18T12:55:00Z
1
value 0.04639
scoring_system epss
scoring_elements 0.89303
published_at 2026-04-16T12:55:00Z
2
value 0.04639
scoring_system epss
scoring_elements 0.89242
published_at 2026-04-01T12:55:00Z
3
value 0.04639
scoring_system epss
scoring_elements 0.89248
published_at 2026-04-02T12:55:00Z
4
value 0.04639
scoring_system epss
scoring_elements 0.89263
published_at 2026-04-04T12:55:00Z
5
value 0.04639
scoring_system epss
scoring_elements 0.89265
published_at 2026-04-07T12:55:00Z
6
value 0.04639
scoring_system epss
scoring_elements 0.89283
published_at 2026-04-08T12:55:00Z
7
value 0.04639
scoring_system epss
scoring_elements 0.89287
published_at 2026-04-09T12:55:00Z
8
value 0.04639
scoring_system epss
scoring_elements 0.89296
published_at 2026-04-11T12:55:00Z
9
value 0.04639
scoring_system epss
scoring_elements 0.89293
published_at 2026-04-12T12:55:00Z
10
value 0.04639
scoring_system epss
scoring_elements 0.8929
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5183
5
reference_url https://bugs.launchpad.net/ubuntu/+source/cups/+bug/298241
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/cups/+bug/298241
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5183
7
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
8
reference_url http://secunia.com/advisories/43521
reference_id
reference_type
scores
url http://secunia.com/advisories/43521
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/46684
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/46684
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10586
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10586
11
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
12
reference_url https://www.exploit-db.com/exploits/7150
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/7150
13
reference_url http://www.debian.org/security/2011/dsa-2176
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2176
14
reference_url http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/
reference_id
reference_type
scores
url http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:028
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:028
16
reference_url http://www.openwall.com/lists/oss-security/2008/11/19/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/19/3
17
reference_url http://www.openwall.com/lists/oss-security/2008/11/19/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/19/4
18
reference_url http://www.openwall.com/lists/oss-security/2008/11/20/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/11/20/1
19
reference_url http://www.redhat.com/support/errata/RHSA-2008-1029.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1029.html
20
reference_url http://www.securityfocus.com/bid/32419
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32419
21
reference_url http://www.securitytracker.com/id?1021396
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021396
22
reference_url http://www.vupen.com/english/advisories/2009/0422
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0422
23
reference_url http://www.vupen.com/english/advisories/2011/0535
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0535
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=473901
reference_id 473901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=473901
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506180
reference_id 506180
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506180
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5183
reference_id CVE-2008-5183
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2008-5183
33
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/7150.html
reference_id OSVDB-50351;CVE-2008-5183
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/7150.html
34
reference_url https://access.redhat.com/errata/RHSA-2008:1029
reference_id RHSA-2008:1029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1029
35
reference_url https://usn.ubuntu.com/707-1/
reference_id USN-707-1
reference_type
scores
url https://usn.ubuntu.com/707-1/
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2008-5183
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8yv6-g189-vugt
4
url VCID-bj8b-t1mc-zfd3
vulnerability_id VCID-bj8b-t1mc-zfd3
summary
Multiple vulnerabilities have been found in CUPS, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://cups.org/articles.php?L596
reference_id
reference_type
scores
url http://cups.org/articles.php?L596
1
reference_url http://cups.org/strfiles/3516/str3516.patch
reference_id
reference_type
scores
url http://cups.org/strfiles/3516/str3516.patch
2
reference_url http://cups.org/str.php?L3516
reference_id
reference_type
scores
url http://cups.org/str.php?L3516
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0542.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0542.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0542
reference_id
reference_type
scores
0
value 0.04413
scoring_system epss
scoring_elements 0.89034
published_at 2026-04-18T12:55:00Z
1
value 0.04413
scoring_system epss
scoring_elements 0.88967
published_at 2026-04-01T12:55:00Z
2
value 0.04413
scoring_system epss
scoring_elements 0.88975
published_at 2026-04-02T12:55:00Z
3
value 0.04413
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-04T12:55:00Z
4
value 0.04413
scoring_system epss
scoring_elements 0.88994
published_at 2026-04-07T12:55:00Z
5
value 0.04413
scoring_system epss
scoring_elements 0.89012
published_at 2026-04-08T12:55:00Z
6
value 0.04413
scoring_system epss
scoring_elements 0.89017
published_at 2026-04-09T12:55:00Z
7
value 0.04413
scoring_system epss
scoring_elements 0.89029
published_at 2026-04-11T12:55:00Z
8
value 0.04413
scoring_system epss
scoring_elements 0.89024
published_at 2026-04-12T12:55:00Z
9
value 0.04413
scoring_system epss
scoring_elements 0.89022
published_at 2026-04-13T12:55:00Z
10
value 0.04413
scoring_system epss
scoring_elements 0.89036
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0542
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542
7
reference_url http://secunia.com/advisories/43521
reference_id
reference_type
scores
url http://secunia.com/advisories/43521
8
reference_url http://security.gentoo.org/glsa/glsa-201207-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201207-10.xml
9
reference_url http://securitytracker.com/id?1024121
reference_id
reference_type
scores
url http://securitytracker.com/id?1024121
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10365
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10365
11
reference_url http://www.debian.org/security/2011/dsa-2176
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2176
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
14
reference_url http://www.securityfocus.com/bid/40943
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40943
15
reference_url http://www.vupen.com/english/advisories/2011/0535
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0535
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=587746
reference_id 587746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=587746
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-0542
reference_id CVE-2010-0542
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-0542
102
reference_url https://security.gentoo.org/glsa/201207-10
reference_id GLSA-201207-10
reference_type
scores
url https://security.gentoo.org/glsa/201207-10
103
reference_url https://access.redhat.com/errata/RHSA-2010:0490
reference_id RHSA-2010:0490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0490
104
reference_url https://usn.ubuntu.com/952-1/
reference_id USN-952-1
reference_type
scores
url https://usn.ubuntu.com/952-1/
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2010-0542
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bj8b-t1mc-zfd3
5
url VCID-fpbv-zqer-w7c3
vulnerability_id VCID-fpbv-zqer-w7c3
summary
Multiple vulnerabilities have been found in CUPS, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://cups.org/articles.php?L596
reference_id
reference_type
scores
url http://cups.org/articles.php?L596
1
reference_url http://cups.org/str.php?L3510
reference_id
reference_type
scores
url http://cups.org/str.php?L3510
2
reference_url http://rhn.redhat.com/errata/RHSA-2010-0811.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2010-0811.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2431.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2431.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2431
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08428
published_at 2026-04-01T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08526
published_at 2026-04-04T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08443
published_at 2026-04-07T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08517
published_at 2026-04-08T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08536
published_at 2026-04-09T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08531
published_at 2026-04-11T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.0847
published_at 2026-04-02T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18614
published_at 2026-04-16T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18626
published_at 2026-04-18T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18717
published_at 2026-04-12T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18667
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2431
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2431
6
reference_url http://secunia.com/advisories/43521
reference_id
reference_type
scores
url http://secunia.com/advisories/43521
7
reference_url http://security.gentoo.org/glsa/glsa-201207-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201207-10.xml
8
reference_url http://www.debian.org/security/2011/dsa-2176
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2176
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
11
reference_url http://www.vupen.com/english/advisories/2010/2856
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2856
12
reference_url http://www.vupen.com/english/advisories/2011/0535
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0535
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=605397
reference_id 605397
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=605397
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2431
reference_id CVE-2010-2431
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2431
99
reference_url https://security.gentoo.org/glsa/201207-10
reference_id GLSA-201207-10
reference_type
scores
url https://security.gentoo.org/glsa/201207-10
100
reference_url https://access.redhat.com/errata/RHSA-2010:0811
reference_id RHSA-2010:0811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0811
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2010-2431
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fpbv-zqer-w7c3
6
url VCID-g2x8-pm39-sfer
vulnerability_id VCID-g2x8-pm39-sfer
summary
Multiple vulnerabilities have been found in CUPS, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0393.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0393
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23747
published_at 2026-04-01T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23863
published_at 2026-04-02T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23904
published_at 2026-04-04T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23692
published_at 2026-04-07T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23763
published_at 2026-04-08T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.2381
published_at 2026-04-09T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23824
published_at 2026-04-11T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.2378
published_at 2026-04-12T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23723
published_at 2026-04-13T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23734
published_at 2026-04-16T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23722
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=558460
reference_id 558460
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=558460
4
reference_url https://security.gentoo.org/glsa/201207-10
reference_id GLSA-201207-10
reference_type
scores
url https://security.gentoo.org/glsa/201207-10
5
reference_url https://usn.ubuntu.com/906-1/
reference_id USN-906-1
reference_type
scores
url https://usn.ubuntu.com/906-1/
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2010-0393
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2x8-pm39-sfer
7
url VCID-mp2s-4x2a-h7fq
vulnerability_id VCID-mp2s-4x2a-h7fq
summary
Multiple vulnerabilities have been found in CUPS, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3553.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3553
reference_id
reference_type
scores
0
value 0.09847
scoring_system epss
scoring_elements 0.92953
published_at 2026-04-01T12:55:00Z
1
value 0.09847
scoring_system epss
scoring_elements 0.92962
published_at 2026-04-02T12:55:00Z
2
value 0.09847
scoring_system epss
scoring_elements 0.92966
published_at 2026-04-07T12:55:00Z
3
value 0.09847
scoring_system epss
scoring_elements 0.92974
published_at 2026-04-08T12:55:00Z
4
value 0.09847
scoring_system epss
scoring_elements 0.92978
published_at 2026-04-09T12:55:00Z
5
value 0.09847
scoring_system epss
scoring_elements 0.92983
published_at 2026-04-11T12:55:00Z
6
value 0.09847
scoring_system epss
scoring_elements 0.92981
published_at 2026-04-12T12:55:00Z
7
value 0.09847
scoring_system epss
scoring_elements 0.92982
published_at 2026-04-13T12:55:00Z
8
value 0.09847
scoring_system epss
scoring_elements 0.92992
published_at 2026-04-16T12:55:00Z
9
value 0.09847
scoring_system epss
scoring_elements 0.92994
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530111
reference_id 530111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530111
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=557740
reference_id 557740
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=557740
5
reference_url https://security.gentoo.org/glsa/201207-10
reference_id GLSA-201207-10
reference_type
scores
url https://security.gentoo.org/glsa/201207-10
6
reference_url https://access.redhat.com/errata/RHSA-2009:1595
reference_id RHSA-2009:1595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1595
7
reference_url https://usn.ubuntu.com/906-1/
reference_id USN-906-1
reference_type
scores
url https://usn.ubuntu.com/906-1/
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2009-3553
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mp2s-4x2a-h7fq
8
url VCID-mtwe-dgnd-c3fj
vulnerability_id VCID-mtwe-dgnd-c3fj
summary cups: IPP_TAG_UNSUPPORTED handling NULL pointer dereference DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0949.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0949.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0949
reference_id
reference_type
scores
0
value 0.20572
scoring_system epss
scoring_elements 0.9554
published_at 2026-04-01T12:55:00Z
1
value 0.20572
scoring_system epss
scoring_elements 0.95549
published_at 2026-04-02T12:55:00Z
2
value 0.20572
scoring_system epss
scoring_elements 0.95554
published_at 2026-04-04T12:55:00Z
3
value 0.20572
scoring_system epss
scoring_elements 0.95558
published_at 2026-04-07T12:55:00Z
4
value 0.20572
scoring_system epss
scoring_elements 0.95565
published_at 2026-04-08T12:55:00Z
5
value 0.20572
scoring_system epss
scoring_elements 0.95568
published_at 2026-04-09T12:55:00Z
6
value 0.20572
scoring_system epss
scoring_elements 0.95572
published_at 2026-04-11T12:55:00Z
7
value 0.20572
scoring_system epss
scoring_elements 0.95573
published_at 2026-04-12T12:55:00Z
8
value 0.20572
scoring_system epss
scoring_elements 0.95574
published_at 2026-04-13T12:55:00Z
9
value 0.20572
scoring_system epss
scoring_elements 0.95582
published_at 2026-04-16T12:55:00Z
10
value 0.22431
scoring_system epss
scoring_elements 0.95846
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0949
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=500972
reference_id 500972
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=500972
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33020.py
reference_id CVE-2009-0949;OSVDB-55002
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33020.py
5
reference_url https://www.securityfocus.com/bid/35169/info
reference_id CVE-2009-0949;OSVDB-55002
reference_type exploit
scores
url https://www.securityfocus.com/bid/35169/info
6
reference_url https://access.redhat.com/errata/RHSA-2009:1082
reference_id RHSA-2009:1082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1082
7
reference_url https://access.redhat.com/errata/RHSA-2009:1083
reference_id RHSA-2009:1083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1083
8
reference_url https://usn.ubuntu.com/780-1/
reference_id USN-780-1
reference_type
scores
url https://usn.ubuntu.com/780-1/
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2009-0949
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mtwe-dgnd-c3fj
9
url VCID-qjzr-avt1-fyfd
vulnerability_id VCID-qjzr-avt1-fyfd
summary xpdf: multiple integer overflows
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0791.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0791.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0791
reference_id
reference_type
scores
0
value 0.05022
scoring_system epss
scoring_elements 0.8969
published_at 2026-04-01T12:55:00Z
1
value 0.05022
scoring_system epss
scoring_elements 0.89693
published_at 2026-04-02T12:55:00Z
2
value 0.05022
scoring_system epss
scoring_elements 0.89708
published_at 2026-04-04T12:55:00Z
3
value 0.05022
scoring_system epss
scoring_elements 0.8971
published_at 2026-04-07T12:55:00Z
4
value 0.05022
scoring_system epss
scoring_elements 0.89727
published_at 2026-04-08T12:55:00Z
5
value 0.05022
scoring_system epss
scoring_elements 0.89734
published_at 2026-04-09T12:55:00Z
6
value 0.05022
scoring_system epss
scoring_elements 0.89741
published_at 2026-04-11T12:55:00Z
7
value 0.05022
scoring_system epss
scoring_elements 0.89739
published_at 2026-04-12T12:55:00Z
8
value 0.05022
scoring_system epss
scoring_elements 0.89732
published_at 2026-04-13T12:55:00Z
9
value 0.05022
scoring_system epss
scoring_elements 0.89749
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0791
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=491840
reference_id 491840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=491840
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535489
reference_id 535489
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535489
5
reference_url https://access.redhat.com/errata/RHSA-2009:0480
reference_id RHSA-2009:0480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0480
6
reference_url https://access.redhat.com/errata/RHSA-2009:1083
reference_id RHSA-2009:1083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1083
7
reference_url https://access.redhat.com/errata/RHSA-2009:1500
reference_id RHSA-2009:1500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1500
8
reference_url https://access.redhat.com/errata/RHSA-2009:1501
reference_id RHSA-2009:1501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1501
9
reference_url https://access.redhat.com/errata/RHSA-2009:1502
reference_id RHSA-2009:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1502
10
reference_url https://access.redhat.com/errata/RHSA-2009:1503
reference_id RHSA-2009:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1503
11
reference_url https://access.redhat.com/errata/RHSA-2009:1512
reference_id RHSA-2009:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1512
12
reference_url https://access.redhat.com/errata/RHSA-2010:0399
reference_id RHSA-2010:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0399
13
reference_url https://access.redhat.com/errata/RHSA-2010:0400
reference_id RHSA-2010:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0400
14
reference_url https://access.redhat.com/errata/RHSA-2010:0401
reference_id RHSA-2010:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0401
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2009-0791
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjzr-avt1-fyfd
10
url VCID-uqp7-5pb9-w7cg
vulnerability_id VCID-uqp7-5pb9-w7cg
summary
Multiple vulnerabilities have been found in CUPS, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://cups.org/articles.php?L596
reference_id
reference_type
scores
url http://cups.org/articles.php?L596
1
reference_url http://cups.org/str.php?L3577
reference_id
reference_type
scores
url http://cups.org/str.php?L3577
2
reference_url http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1748.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1748.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1748
reference_id
reference_type
scores
0
value 0.12394
scoring_system epss
scoring_elements 0.93917
published_at 2026-04-18T12:55:00Z
1
value 0.12394
scoring_system epss
scoring_elements 0.93853
published_at 2026-04-01T12:55:00Z
2
value 0.12394
scoring_system epss
scoring_elements 0.93862
published_at 2026-04-02T12:55:00Z
3
value 0.12394
scoring_system epss
scoring_elements 0.93871
published_at 2026-04-04T12:55:00Z
4
value 0.12394
scoring_system epss
scoring_elements 0.93874
published_at 2026-04-07T12:55:00Z
5
value 0.12394
scoring_system epss
scoring_elements 0.93883
published_at 2026-04-08T12:55:00Z
6
value 0.12394
scoring_system epss
scoring_elements 0.93886
published_at 2026-04-09T12:55:00Z
7
value 0.12394
scoring_system epss
scoring_elements 0.9389
published_at 2026-04-13T12:55:00Z
8
value 0.12394
scoring_system epss
scoring_elements 0.93891
published_at 2026-04-12T12:55:00Z
9
value 0.12394
scoring_system epss
scoring_elements 0.93912
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1748
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748
7
reference_url http://secunia.com/advisories/40220
reference_id
reference_type
scores
url http://secunia.com/advisories/40220
8
reference_url http://secunia.com/advisories/43521
reference_id
reference_type
scores
url http://secunia.com/advisories/43521
9
reference_url http://security.gentoo.org/glsa/glsa-201207-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201207-10.xml
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9723
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9723
11
reference_url http://support.apple.com/kb/HT4188
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4188
12
reference_url http://www.debian.org/security/2011/dsa-2176
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2176
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
15
reference_url http://www.securityfocus.com/bid/40871
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40871
16
reference_url http://www.vupen.com/english/advisories/2010/1481
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1481
17
reference_url http://www.vupen.com/english/advisories/2011/0535
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0535
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=591983
reference_id 591983
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=591983
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1748
reference_id CVE-2010-1748
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-1748
114
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34152.txt
reference_id CVE-2010-1748;OSVDB-65569
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34152.txt
115
reference_url https://www.securityfocus.com/bid/40897/info
reference_id CVE-2010-1748;OSVDB-65569
reference_type exploit
scores
url https://www.securityfocus.com/bid/40897/info
116
reference_url https://security.gentoo.org/glsa/201207-10
reference_id GLSA-201207-10
reference_type
scores
url https://security.gentoo.org/glsa/201207-10
117
reference_url https://access.redhat.com/errata/RHSA-2010:0490
reference_id RHSA-2010:0490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0490
118
reference_url https://usn.ubuntu.com/952-1/
reference_id USN-952-1
reference_type
scores
url https://usn.ubuntu.com/952-1/
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2010-1748
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uqp7-5pb9-w7cg
11
url VCID-ur43-jbhj-k7bk
vulnerability_id VCID-ur43-jbhj-k7bk
summary
Multiple vulnerabilities have been found in CUPS, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://cups.org/articles.php?L596
reference_id
reference_type
scores
url http://cups.org/articles.php?L596
1
reference_url http://cups.org/str.php?L3518
reference_id
reference_type
scores
url http://cups.org/str.php?L3518
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2432.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2432.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2432
reference_id
reference_type
scores
0
value 0.00829
scoring_system epss
scoring_elements 0.74471
published_at 2026-04-01T12:55:00Z
1
value 0.00829
scoring_system epss
scoring_elements 0.74501
published_at 2026-04-04T12:55:00Z
2
value 0.00829
scoring_system epss
scoring_elements 0.74476
published_at 2026-04-07T12:55:00Z
3
value 0.00829
scoring_system epss
scoring_elements 0.74508
published_at 2026-04-08T12:55:00Z
4
value 0.00829
scoring_system epss
scoring_elements 0.74523
published_at 2026-04-09T12:55:00Z
5
value 0.00829
scoring_system epss
scoring_elements 0.74545
published_at 2026-04-11T12:55:00Z
6
value 0.00829
scoring_system epss
scoring_elements 0.74475
published_at 2026-04-02T12:55:00Z
7
value 0.00907
scoring_system epss
scoring_elements 0.75795
published_at 2026-04-16T12:55:00Z
8
value 0.00907
scoring_system epss
scoring_elements 0.75798
published_at 2026-04-18T12:55:00Z
9
value 0.00907
scoring_system epss
scoring_elements 0.75763
published_at 2026-04-12T12:55:00Z
10
value 0.00907
scoring_system epss
scoring_elements 0.75757
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2432
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2432
5
reference_url http://secunia.com/advisories/43521
reference_id
reference_type
scores
url http://secunia.com/advisories/43521
6
reference_url http://security.gentoo.org/glsa/glsa-201207-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201207-10.xml
7
reference_url http://www.debian.org/security/2011/dsa-2176
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2176
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:146
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:146
9
reference_url http://www.vupen.com/english/advisories/2011/0535
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0535
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=607211
reference_id 607211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=607211
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2432
reference_id CVE-2010-2432
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2432
96
reference_url https://security.gentoo.org/glsa/201207-10
reference_id GLSA-201207-10
reference_type
scores
url https://security.gentoo.org/glsa/201207-10
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2010-2432
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ur43-jbhj-k7bk
12
url VCID-vmjh-9kbz-qkh6
vulnerability_id VCID-vmjh-9kbz-qkh6
summary cups: Several XSS flaws in forms processed by CUPS web interface
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2820.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2820.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2820
reference_id
reference_type
scores
0
value 0.01995
scoring_system epss
scoring_elements 0.83564
published_at 2026-04-01T12:55:00Z
1
value 0.01995
scoring_system epss
scoring_elements 0.83576
published_at 2026-04-02T12:55:00Z
2
value 0.01995
scoring_system epss
scoring_elements 0.83591
published_at 2026-04-04T12:55:00Z
3
value 0.01995
scoring_system epss
scoring_elements 0.83592
published_at 2026-04-07T12:55:00Z
4
value 0.01995
scoring_system epss
scoring_elements 0.83616
published_at 2026-04-08T12:55:00Z
5
value 0.01995
scoring_system epss
scoring_elements 0.83625
published_at 2026-04-09T12:55:00Z
6
value 0.01995
scoring_system epss
scoring_elements 0.83642
published_at 2026-04-11T12:55:00Z
7
value 0.01995
scoring_system epss
scoring_elements 0.83635
published_at 2026-04-12T12:55:00Z
8
value 0.01995
scoring_system epss
scoring_elements 0.8363
published_at 2026-04-13T12:55:00Z
9
value 0.01995
scoring_system epss
scoring_elements 0.83665
published_at 2026-04-16T12:55:00Z
10
value 0.01995
scoring_system epss
scoring_elements 0.83667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2820
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2820
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=529833
reference_id 529833
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=529833
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555666
reference_id 555666
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555666
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10001.txt
reference_id CVE-2009-2820;OSVDB-59854
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10001.txt
6
reference_url https://www.securityfocus.com/bid/36958/info
reference_id CVE-2009-2820;OSVDB-59854
reference_type exploit
scores
url https://www.securityfocus.com/bid/36958/info
7
reference_url https://access.redhat.com/errata/RHSA-2009:1595
reference_id RHSA-2009:1595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1595
8
reference_url https://usn.ubuntu.com/856-1/
reference_id USN-856-1
reference_type
scores
url https://usn.ubuntu.com/856-1/
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2009-2820
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vmjh-9kbz-qkh6
13
url VCID-xp1f-4p3v-67ad
vulnerability_id VCID-xp1f-4p3v-67ad
summary
Multiple vulnerabilities have been found in CUPS, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
reference_id
reference_type
scores
url http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2010-0811.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2010-0811.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2941.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2941.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2941
reference_id
reference_type
scores
0
value 0.21353
scoring_system epss
scoring_elements 0.95705
published_at 2026-04-18T12:55:00Z
1
value 0.21353
scoring_system epss
scoring_elements 0.95701
published_at 2026-04-16T12:55:00Z
2
value 0.21353
scoring_system epss
scoring_elements 0.95658
published_at 2026-04-01T12:55:00Z
3
value 0.21353
scoring_system epss
scoring_elements 0.95667
published_at 2026-04-02T12:55:00Z
4
value 0.21353
scoring_system epss
scoring_elements 0.95673
published_at 2026-04-04T12:55:00Z
5
value 0.21353
scoring_system epss
scoring_elements 0.95675
published_at 2026-04-07T12:55:00Z
6
value 0.21353
scoring_system epss
scoring_elements 0.95684
published_at 2026-04-08T12:55:00Z
7
value 0.21353
scoring_system epss
scoring_elements 0.95688
published_at 2026-04-09T12:55:00Z
8
value 0.21353
scoring_system epss
scoring_elements 0.95692
published_at 2026-04-11T12:55:00Z
9
value 0.21353
scoring_system epss
scoring_elements 0.95691
published_at 2026-04-12T12:55:00Z
10
value 0.21353
scoring_system epss
scoring_elements 0.95693
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2941
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941
10
reference_url http://secunia.com/advisories/42287
reference_id
reference_type
scores
url http://secunia.com/advisories/42287
11
reference_url http://secunia.com/advisories/42867
reference_id
reference_type
scores
url http://secunia.com/advisories/42867
12
reference_url http://secunia.com/advisories/43521
reference_id
reference_type
scores
url http://secunia.com/advisories/43521
13
reference_url http://security.gentoo.org/glsa/glsa-201207-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201207-10.xml
14
reference_url http://securitytracker.com/id?1024662
reference_id
reference_type
scores
url http://securitytracker.com/id?1024662
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/62882
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/62882
16
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.468323
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.468323
17
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
18
reference_url http://www.debian.org/security/2011/dsa-2176
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2176
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:233
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:233
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
22
reference_url http://www.osvdb.org/68951
reference_id
reference_type
scores
url http://www.osvdb.org/68951
23
reference_url http://www.redhat.com/support/errata/RHSA-2010-0866.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0866.html
24
reference_url http://www.securityfocus.com/bid/44530
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44530
25
reference_url http://www.ubuntu.com/usn/USN-1012-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1012-1
26
reference_url http://www.vupen.com/english/advisories/2010/2856
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2856
27
reference_url http://www.vupen.com/english/advisories/2010/3042
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3042
28
reference_url http://www.vupen.com/english/advisories/2010/3088
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3088
29
reference_url http://www.vupen.com/english/advisories/2011/0061
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0061
30
reference_url http://www.vupen.com/english/advisories/2011/0535
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0535
31
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603344
reference_id 603344
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603344
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=624438
reference_id 624438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=624438
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2941
reference_id CVE-2010-2941
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2010-2941
58
reference_url https://security.gentoo.org/glsa/201207-10
reference_id GLSA-201207-10
reference_type
scores
url https://security.gentoo.org/glsa/201207-10
59
reference_url https://access.redhat.com/errata/RHSA-2010:0811
reference_id RHSA-2010:0811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0811
60
reference_url https://access.redhat.com/errata/RHSA-2010:0866
reference_id RHSA-2010:0866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0866
61
reference_url https://usn.ubuntu.com/1012-1/
reference_id USN-1012-1
reference_type
scores
url https://usn.ubuntu.com/1012-1/
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2010-2941
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xp1f-4p3v-67ad
14
url VCID-zm2g-nduw-tfcy
vulnerability_id VCID-zm2g-nduw-tfcy
summary
Multiple errors in CUPS might allow for the remote execution of arbitrary
    code or DNS rebinding attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0164.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0164.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0164
reference_id
reference_type
scores
0
value 0.04186
scoring_system epss
scoring_elements 0.88716
published_at 2026-04-13T12:55:00Z
1
value 0.04186
scoring_system epss
scoring_elements 0.88729
published_at 2026-04-16T12:55:00Z
2
value 0.04186
scoring_system epss
scoring_elements 0.88727
published_at 2026-04-18T12:55:00Z
3
value 0.05721
scoring_system epss
scoring_elements 0.90412
published_at 2026-04-07T12:55:00Z
4
value 0.05721
scoring_system epss
scoring_elements 0.90426
published_at 2026-04-08T12:55:00Z
5
value 0.05721
scoring_system epss
scoring_elements 0.90392
published_at 2026-04-01T12:55:00Z
6
value 0.05721
scoring_system epss
scoring_elements 0.90439
published_at 2026-04-11T12:55:00Z
7
value 0.05721
scoring_system epss
scoring_elements 0.90432
published_at 2026-04-09T12:55:00Z
8
value 0.05721
scoring_system epss
scoring_elements 0.90395
published_at 2026-04-02T12:55:00Z
9
value 0.05721
scoring_system epss
scoring_elements 0.90407
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0164
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490597
reference_id 490597
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490597
4
reference_url https://security.gentoo.org/glsa/200904-20
reference_id GLSA-200904-20
reference_type
scores
url https://security.gentoo.org/glsa/200904-20
fixed_packages
0
url pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
purl pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-35gf-189e-3ud4
2
vulnerability VCID-39f1-22a5-c7aw
3
vulnerability VCID-3ame-feez-yqhc
4
vulnerability VCID-3etj-2m21-ffa1
5
vulnerability VCID-44ju-8618-vqht
6
vulnerability VCID-48ht-j7ga-9ugq
7
vulnerability VCID-4bxg-5tnm-y3hw
8
vulnerability VCID-6mus-21kz-uuhz
9
vulnerability VCID-7wg4-sc9v-bffk
10
vulnerability VCID-843p-8xve-nfer
11
vulnerability VCID-993k-m3sq-gufu
12
vulnerability VCID-am36-6m5v-fkba
13
vulnerability VCID-anr5-gc12-e7dr
14
vulnerability VCID-apyh-1uza-pffa
15
vulnerability VCID-aznw-8yer-xfhf
16
vulnerability VCID-bzht-vhe3-y7bf
17
vulnerability VCID-cf81-58ju-bqaz
18
vulnerability VCID-ed99-uccv-d7bh
19
vulnerability VCID-ev9c-v5dv-37fb
20
vulnerability VCID-fby6-8f6z-63fw
21
vulnerability VCID-fkyp-m1p9-mfhy
22
vulnerability VCID-k4yw-jg6v-1bcc
23
vulnerability VCID-mcmb-bvw9-dba5
24
vulnerability VCID-mtzd-538p-kbhm
25
vulnerability VCID-p8gy-dd3u-uqh4
26
vulnerability VCID-pwkd-sgtt-1bef
27
vulnerability VCID-q8a8-fd7r-1kg7
28
vulnerability VCID-qxwq-vp9g-ukca
29
vulnerability VCID-ucmb-we3r-aqcd
30
vulnerability VCID-ukec-69r2-xbef
31
vulnerability VCID-vx54-r2dt-8ue5
32
vulnerability VCID-w17y-dvuq-7ba6
33
vulnerability VCID-wjht-u5u1-kkas
34
vulnerability VCID-wqu4-wys6-hfbb
35
vulnerability VCID-y7a9-2p1n-z7fx
36
vulnerability VCID-yyrd-qt22-w3f5
37
vulnerability VCID-zjj3-g2d7-c3gd
38
vulnerability VCID-zt43-htwu-kfde
39
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5
aliases CVE-2009-0164
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zm2g-nduw-tfcy
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5