Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie
Typedeb
Namespacedebian
Namecups-filters
Version1.28.7-1+deb11u4
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.28.17-3
Latest_non_vulnerable_version1.28.17-7
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6qd1-jvb8-jqak
vulnerability_id VCID-6qd1-jvb8-jqak
summary cups: cups-filters: cups-filters: Out-of-bounds write via crafted PDF MediaBox
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64503.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-64503
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06713
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06652
published_at 2026-04-11T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06645
published_at 2026-04-12T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06637
published_at 2026-04-13T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06564
published_at 2026-04-16T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06556
published_at 2026-04-18T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14926
published_at 2026-04-04T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14849
published_at 2026-04-02T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14874
published_at 2026-04-09T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14819
published_at 2026-04-08T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14728
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-64503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64503
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120697
reference_id 1120697
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120697
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120698
reference_id 1120698
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414705
reference_id 2414705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414705
7
reference_url https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865
reference_id 50d94ca0f2fa6177613c97c59791bde568631865
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865
8
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9
reference_id GHSA-893j-2wr2-wrh9
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9
9
reference_url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620
reference_id pdftoraster.cxx#L1620
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620
10
reference_url https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790
reference_id pdftoraster.cxx#L1790
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790
11
reference_url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880
reference_id pdftoraster.cxx#L1880
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880
12
reference_url https://access.redhat.com/errata/RHSA-2026:8814
reference_id RHSA-2026:8814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8814
13
reference_url https://usn.ubuntu.com/7877-1/
reference_id USN-7877-1
reference_type
scores
url https://usn.ubuntu.com/7877-1/
14
reference_url https://usn.ubuntu.com/7878-1/
reference_id USN-7878-1
reference_type
scores
url https://usn.ubuntu.com/7878-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2025-64503
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qd1-jvb8-jqak
1
url VCID-7xq5-z572-xub3
vulnerability_id VCID-7xq5-z572-xub3
summary cups: CUPS-Filters: Information disclosure and data corruption via crafted TIFF image file processing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57812.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-57812
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04222
published_at 2026-04-21T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04165
published_at 2026-04-11T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04148
published_at 2026-04-12T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04123
published_at 2026-04-13T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04094
published_at 2026-04-16T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04102
published_at 2026-04-18T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15646
published_at 2026-04-04T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15579
published_at 2026-04-02T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15589
published_at 2026-04-09T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15534
published_at 2026-04-08T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15447
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-57812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57812
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120703
reference_id 1120703
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120703
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120704
reference_id 1120704
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120704
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414632
reference_id 2414632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414632
7
reference_url https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa
reference_id b69dfacec7f176281782e2f7ac44f04bf9633cfa
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa
8
reference_url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4
reference_id GHSA-jpxg-qc2c-hgv4
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4
9
reference_url https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32
reference_id image-tiff.c#L32
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32
10
reference_url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34
reference_id image-tiff.c#L34
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34
11
reference_url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613
reference_id imagetoraster.c#L613
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613
12
reference_url https://access.redhat.com/errata/RHSA-2026:8814
reference_id RHSA-2026:8814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8814
13
reference_url https://usn.ubuntu.com/7877-1/
reference_id USN-7877-1
reference_type
scores
url https://usn.ubuntu.com/7877-1/
14
reference_url https://usn.ubuntu.com/7878-1/
reference_id USN-7878-1
reference_type
scores
url https://usn.ubuntu.com/7878-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2025-57812
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xq5-z572-xub3
2
url VCID-rcep-az2v-1yab
vulnerability_id VCID-rcep-az2v-1yab
summary cups-filters: cups-filters: Heap buffer overflow in rastertopclx filter may lead arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64524.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-64524
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06259
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06351
published_at 2026-04-18T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09791
published_at 2026-04-02T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09865
published_at 2026-04-09T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09873
published_at 2026-04-11T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09837
published_at 2026-04-12T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09821
published_at 2026-04-13T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09703
published_at 2026-04-16T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09841
published_at 2026-04-04T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09742
published_at 2026-04-07T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.09813
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-64524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64524
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414780
reference_id 2414780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414780
5
reference_url https://github.com/OpenPrinting/cups-filters/commit/956283c74a34ae924266a2a63f8e5f529a1abd06
reference_id 956283c74a34ae924266a2a63f8e5f529a1abd06
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-21T16:06:45Z/
url https://github.com/OpenPrinting/cups-filters/commit/956283c74a34ae924266a2a63f8e5f529a1abd06
6
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq44-2q5p-x3hv
reference_id GHSA-rq44-2q5p-x3hv
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-21T16:06:45Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq44-2q5p-x3hv
7
reference_url https://usn.ubuntu.com/7878-1/
reference_id USN-7878-1
reference_type
scores
url https://usn.ubuntu.com/7878-1/
8
reference_url https://usn.ubuntu.com/7878-2/
reference_id USN-7878-2
reference_type
scores
url https://usn.ubuntu.com/7878-2/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2025-64524
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcep-az2v-1yab
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u4%3Fdistro=trixie