Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/net-print/cups@2.4.7
Typeebuild
Namespacenet-print
Namecups
Version2.4.7
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.10.0-r2
Latest_non_vulnerable_version3.01-r2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-aznw-8yer-xfhf
vulnerability_id VCID-aznw-8yer-xfhf
summary Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34241
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09741
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09686
published_at 2026-04-07T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.0979
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09768
published_at 2026-04-13T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09785
published_at 2026-04-12T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09816
published_at 2026-04-11T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09807
published_at 2026-04-09T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09757
published_at 2026-04-08T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10737
published_at 2026-04-16T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11662
published_at 2026-04-24T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.1158
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11703
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34241
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2023/06/26/1
reference_id 1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url http://www.openwall.com/lists/oss-security/2023/06/26/1
5
reference_url http://www.openwall.com/lists/oss-security/2023/06/23/10
reference_id 10
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url http://www.openwall.com/lists/oss-security/2023/06/23/10
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885
reference_id 1038885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2214914
reference_id 2214914
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2214914
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/
reference_id 7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/
9
reference_url https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2
reference_id 9809947a959e18409dcf562a3466ef246cb90cb2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2
10
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25
reference_id GHSA-qjgh-5hcq-5f25
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25
11
reference_url https://security.gentoo.org/glsa/202402-17
reference_id GLSA-202402-17
reference_type
scores
url https://security.gentoo.org/glsa/202402-17
12
reference_url https://support.apple.com/kb/HT213843
reference_id HT213843
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://support.apple.com/kb/HT213843
13
reference_url https://support.apple.com/kb/HT213844
reference_id HT213844
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://support.apple.com/kb/HT213844
14
reference_url https://support.apple.com/kb/HT213845
reference_id HT213845
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://support.apple.com/kb/HT213845
15
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html
16
reference_url https://access.redhat.com/errata/RHSA-2023:6596
reference_id RHSA-2023:6596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6596
17
reference_url https://access.redhat.com/errata/RHSA-2023:7165
reference_id RHSA-2023:7165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7165
18
reference_url https://access.redhat.com/errata/RHSA-2024:1101
reference_id RHSA-2024:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1101
19
reference_url https://access.redhat.com/errata/RHSA-2024:1409
reference_id RHSA-2024:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1409
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/
reference_id TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/
21
reference_url https://usn.ubuntu.com/6184-1/
reference_id USN-6184-1
reference_type
scores
url https://usn.ubuntu.com/6184-1/
22
reference_url https://usn.ubuntu.com/6184-2/
reference_id USN-6184-2
reference_type
scores
url https://usn.ubuntu.com/6184-2/
23
reference_url https://github.com/OpenPrinting/cups/releases/tag/v2.4.6
reference_id v2.4.6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://github.com/OpenPrinting/cups/releases/tag/v2.4.6
fixed_packages
0
url pkg:ebuild/net-print/cups@2.4.7
purl pkg:ebuild/net-print/cups@2.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@2.4.7
aliases CVE-2023-34241
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aznw-8yer-xfhf
1
url VCID-p8gy-dd3u-uqh4
vulnerability_id VCID-p8gy-dd3u-uqh4
summary Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26691
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09492
published_at 2026-04-04T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09443
published_at 2026-04-02T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.10972
published_at 2026-04-09T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.10974
published_at 2026-04-11T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.10942
published_at 2026-04-12T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.10918
published_at 2026-04-13T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.10782
published_at 2026-04-16T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.10796
published_at 2026-04-18T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-24T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.10841
published_at 2026-04-07T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10917
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c
reference_id
reference_type
scores
url https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c
5
reference_url https://support.apple.com/en-us/HT213183
reference_id
reference_type
scores
url https://support.apple.com/en-us/HT213183
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769
reference_id 1011769
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2084321
reference_id 2084321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2084321
8
reference_url https://security.gentoo.org/glsa/202402-17
reference_id GLSA-202402-17
reference_type
scores
url https://security.gentoo.org/glsa/202402-17
9
reference_url https://access.redhat.com/errata/RHSA-2022:4990
reference_id RHSA-2022:4990
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4990
10
reference_url https://access.redhat.com/errata/RHSA-2022:5054
reference_id RHSA-2022:5054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5054
11
reference_url https://access.redhat.com/errata/RHSA-2022:5055
reference_id RHSA-2022:5055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5055
12
reference_url https://access.redhat.com/errata/RHSA-2022:5056
reference_id RHSA-2022:5056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5056
13
reference_url https://access.redhat.com/errata/RHSA-2022:5057
reference_id RHSA-2022:5057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5057
14
reference_url https://usn.ubuntu.com/5454-1/
reference_id USN-5454-1
reference_type
scores
url https://usn.ubuntu.com/5454-1/
15
reference_url https://usn.ubuntu.com/5454-2/
reference_id USN-5454-2
reference_type
scores
url https://usn.ubuntu.com/5454-2/
fixed_packages
0
url pkg:ebuild/net-print/cups@2.4.7
purl pkg:ebuild/net-print/cups@2.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@2.4.7
aliases CVE-2022-26691, MNDT-2022-0026
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p8gy-dd3u-uqh4
2
url VCID-q8a8-fd7r-1kg7
vulnerability_id VCID-q8a8-fd7r-1kg7
summary Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32324
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46866
published_at 2026-04-02T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46885
published_at 2026-04-08T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46883
published_at 2026-04-04T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.4683
published_at 2026-04-07T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46884
published_at 2026-04-09T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46907
published_at 2026-04-11T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.4688
published_at 2026-04-12T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46887
published_at 2026-04-13T12:55:00Z
8
value 0.00259
scoring_system epss
scoring_elements 0.49246
published_at 2026-04-21T12:55:00Z
9
value 0.00259
scoring_system epss
scoring_elements 0.49279
published_at 2026-04-16T12:55:00Z
10
value 0.00259
scoring_system epss
scoring_elements 0.49276
published_at 2026-04-18T12:55:00Z
11
value 0.00259
scoring_system epss
scoring_elements 0.49235
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32324
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2209603
reference_id 2209603
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2209603
5
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7
reference_id GHSA-cxc6-w2g7-69p7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7
6
reference_url https://security.gentoo.org/glsa/202402-17
reference_id GLSA-202402-17
reference_type
scores
url https://security.gentoo.org/glsa/202402-17
7
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:6596
reference_id RHSA-2023:6596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6596
9
reference_url https://access.redhat.com/errata/RHSA-2023:7165
reference_id RHSA-2023:7165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7165
10
reference_url https://access.redhat.com/errata/RHSA-2024:1101
reference_id RHSA-2024:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1101
11
reference_url https://access.redhat.com/errata/RHSA-2024:1409
reference_id RHSA-2024:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1409
12
reference_url https://usn.ubuntu.com/6128-1/
reference_id USN-6128-1
reference_type
scores
url https://usn.ubuntu.com/6128-1/
13
reference_url https://usn.ubuntu.com/6128-2/
reference_id USN-6128-2
reference_type
scores
url https://usn.ubuntu.com/6128-2/
fixed_packages
0
url pkg:ebuild/net-print/cups@2.4.7
purl pkg:ebuild/net-print/cups@2.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@2.4.7
aliases CVE-2023-32324
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8a8-fd7r-1kg7
3
url VCID-vx54-r2dt-8ue5
vulnerability_id VCID-vx54-r2dt-8ue5
summary Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4504
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10426
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.1042
published_at 2026-04-24T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10494
published_at 2026-04-04T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10354
published_at 2026-04-07T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10427
published_at 2026-04-08T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10491
published_at 2026-04-09T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10522
published_at 2026-04-11T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10489
published_at 2026-04-12T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10466
published_at 2026-04-13T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10334
published_at 2026-04-16T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10307
published_at 2026-04-18T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10437
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4504
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238509
reference_id 2238509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238509
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/
reference_id 5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/
reference_id 5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/
reference_id AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/
8
reference_url https://takeonme.org/cves/CVE-2023-4504.html
reference_id CVE-2023-4504.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://takeonme.org/cves/CVE-2023-4504.html
9
reference_url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6
reference_id GHSA-4f65-6ph5-qwh6
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6
10
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h
reference_id GHSA-pf5r-86w9-678h
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h
11
reference_url https://security.gentoo.org/glsa/202402-17
reference_id GLSA-202402-17
reference_type
scores
url https://security.gentoo.org/glsa/202402-17
12
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/
reference_id PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/
reference_id T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/
15
reference_url https://usn.ubuntu.com/6391-1/
reference_id USN-6391-1
reference_type
scores
url https://usn.ubuntu.com/6391-1/
16
reference_url https://usn.ubuntu.com/6391-2/
reference_id USN-6391-2
reference_type
scores
url https://usn.ubuntu.com/6391-2/
17
reference_url https://usn.ubuntu.com/6392-1/
reference_id USN-6392-1
reference_type
scores
url https://usn.ubuntu.com/6392-1/
18
reference_url https://github.com/OpenPrinting/cups/releases/tag/v2.4.7
reference_id v2.4.7
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://github.com/OpenPrinting/cups/releases/tag/v2.4.7
fixed_packages
0
url pkg:ebuild/net-print/cups@2.4.7
purl pkg:ebuild/net-print/cups@2.4.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@2.4.7
aliases CVE-2023-4504
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vx54-r2dt-8ue5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@2.4.7