Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-text/ghostscript-gpl@9.26
Typeebuild
Namespaceapp-text
Nameghostscript-gpl
Version9.26
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version9.28_rc4
Latest_non_vulnerable_version10.05.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1mjs-khds-v3hb
vulnerability_id VCID-1mjs-khds-v3hb
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9611.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9611
reference_id
reference_type
scores
0
value 0.00392
scoring_system epss
scoring_elements 0.60107
published_at 2026-04-01T12:55:00Z
1
value 0.00392
scoring_system epss
scoring_elements 0.60253
published_at 2026-04-26T12:55:00Z
2
value 0.00392
scoring_system epss
scoring_elements 0.60266
published_at 2026-04-21T12:55:00Z
3
value 0.00392
scoring_system epss
scoring_elements 0.60237
published_at 2026-04-24T12:55:00Z
4
value 0.00392
scoring_system epss
scoring_elements 0.60184
published_at 2026-04-02T12:55:00Z
5
value 0.00392
scoring_system epss
scoring_elements 0.60209
published_at 2026-04-04T12:55:00Z
6
value 0.00392
scoring_system epss
scoring_elements 0.60178
published_at 2026-04-07T12:55:00Z
7
value 0.00392
scoring_system epss
scoring_elements 0.60228
published_at 2026-04-08T12:55:00Z
8
value 0.00392
scoring_system epss
scoring_elements 0.60243
published_at 2026-04-09T12:55:00Z
9
value 0.00392
scoring_system epss
scoring_elements 0.60263
published_at 2026-04-11T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.6025
published_at 2026-04-12T12:55:00Z
11
value 0.00392
scoring_system epss
scoring_elements 0.60232
published_at 2026-04-13T12:55:00Z
12
value 0.00392
scoring_system epss
scoring_elements 0.60272
published_at 2026-04-16T12:55:00Z
13
value 0.00392
scoring_system epss
scoring_elements 0.60279
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9611
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1475825
reference_id 1475825
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1475825
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869917
reference_id 869917
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869917
12
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
13
reference_url https://usn.ubuntu.com/3403-1/
reference_id USN-3403-1
reference_type
scores
url https://usn.ubuntu.com/3403-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2017-9611
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1mjs-khds-v3hb
1
url VCID-2kb1-haea-eqdd
vulnerability_id VCID-2kb1-haea-eqdd
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16585.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16585.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16585
reference_id
reference_type
scores
0
value 0.00496
scoring_system epss
scoring_elements 0.65854
published_at 2026-04-26T12:55:00Z
1
value 0.00496
scoring_system epss
scoring_elements 0.65711
published_at 2026-04-01T12:55:00Z
2
value 0.00496
scoring_system epss
scoring_elements 0.6576
published_at 2026-04-02T12:55:00Z
3
value 0.00496
scoring_system epss
scoring_elements 0.65819
published_at 2026-04-09T12:55:00Z
4
value 0.00496
scoring_system epss
scoring_elements 0.65839
published_at 2026-04-11T12:55:00Z
5
value 0.00496
scoring_system epss
scoring_elements 0.65826
published_at 2026-04-12T12:55:00Z
6
value 0.00496
scoring_system epss
scoring_elements 0.65796
published_at 2026-04-13T12:55:00Z
7
value 0.00496
scoring_system epss
scoring_elements 0.6583
published_at 2026-04-16T12:55:00Z
8
value 0.00496
scoring_system epss
scoring_elements 0.65844
published_at 2026-04-24T12:55:00Z
9
value 0.00496
scoring_system epss
scoring_elements 0.65831
published_at 2026-04-21T12:55:00Z
10
value 0.00496
scoring_system epss
scoring_elements 0.65791
published_at 2026-04-04T12:55:00Z
11
value 0.00496
scoring_system epss
scoring_elements 0.65756
published_at 2026-04-07T12:55:00Z
12
value 0.00496
scoring_system epss
scoring_elements 0.65809
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16585
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1626193
reference_id 1626193
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1626193
16
reference_url https://seclists.org/oss-sec/2018/q3/182
reference_id 182
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/
url https://seclists.org/oss-sec/2018/q3/182
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908305
reference_id 908305
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908305
18
reference_url https://www.debian.org/security/2018/dsa-4288
reference_id dsa-4288
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/
url https://www.debian.org/security/2018/dsa-4288
19
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/
url https://security.gentoo.org/glsa/201811-12
20
reference_url http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=1497d65039885a52b598b137dd8622bd4672f9be
reference_id ?p=ghostpdl.git%3Ba=commitdiff%3Bh=1497d65039885a52b598b137dd8622bd4672f9be
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/
url http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=1497d65039885a52b598b137dd8622bd4672f9be
21
reference_url http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=971472c83a345a16dac9f90f91258bb22dd77f22
reference_id ?p=ghostpdl.git%3Ba=commitdiff%3Bh=971472c83a345a16dac9f90f91258bb22dd77f22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/
url http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=971472c83a345a16dac9f90f91258bb22dd77f22
22
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-16585
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2kb1-haea-eqdd
2
url VCID-3f72-qcbj-3fev
vulnerability_id VCID-3f72-qcbj-3fev
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16540.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16540.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16540
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51739
published_at 2026-04-01T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.51788
published_at 2026-04-02T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.51814
published_at 2026-04-04T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51775
published_at 2026-04-07T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.5183
published_at 2026-04-08T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.51827
published_at 2026-04-09T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51878
published_at 2026-04-11T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51858
published_at 2026-04-12T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51843
published_at 2026-04-13T12:55:00Z
9
value 0.00284
scoring_system epss
scoring_elements 0.51885
published_at 2026-04-16T12:55:00Z
10
value 0.00284
scoring_system epss
scoring_elements 0.51892
published_at 2026-04-18T12:55:00Z
11
value 0.00284
scoring_system epss
scoring_elements 0.51874
published_at 2026-04-21T12:55:00Z
12
value 0.00284
scoring_system epss
scoring_elements 0.51822
published_at 2026-04-24T12:55:00Z
13
value 0.00284
scoring_system epss
scoring_elements 0.51828
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16540
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1625843
reference_id 1625843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1625843
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
reference_id 907332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
17
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
18
reference_url https://access.redhat.com/errata/RHSA-2019:0229
reference_id RHSA-2019:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0229
19
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-16540
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3f72-qcbj-3fev
3
url VCID-4c92-nxd1-m7ak
vulnerability_id VCID-4c92-nxd1-m7ak
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9835.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9835
reference_id
reference_type
scores
0
value 0.00286
scoring_system epss
scoring_elements 0.51944
published_at 2026-04-01T12:55:00Z
1
value 0.00286
scoring_system epss
scoring_elements 0.52035
published_at 2026-04-26T12:55:00Z
2
value 0.00286
scoring_system epss
scoring_elements 0.52082
published_at 2026-04-21T12:55:00Z
3
value 0.00286
scoring_system epss
scoring_elements 0.52029
published_at 2026-04-24T12:55:00Z
4
value 0.00286
scoring_system epss
scoring_elements 0.51992
published_at 2026-04-02T12:55:00Z
5
value 0.00286
scoring_system epss
scoring_elements 0.52019
published_at 2026-04-04T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.51985
published_at 2026-04-07T12:55:00Z
7
value 0.00286
scoring_system epss
scoring_elements 0.52039
published_at 2026-04-08T12:55:00Z
8
value 0.00286
scoring_system epss
scoring_elements 0.52036
published_at 2026-04-09T12:55:00Z
9
value 0.00286
scoring_system epss
scoring_elements 0.52088
published_at 2026-04-11T12:55:00Z
10
value 0.00286
scoring_system epss
scoring_elements 0.52071
published_at 2026-04-12T12:55:00Z
11
value 0.00286
scoring_system epss
scoring_elements 0.52054
published_at 2026-04-13T12:55:00Z
12
value 0.00286
scoring_system epss
scoring_elements 0.52094
published_at 2026-04-16T12:55:00Z
13
value 0.00286
scoring_system epss
scoring_elements 0.521
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1475837
reference_id 1475837
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1475837
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869907
reference_id 869907
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869907
12
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
13
reference_url https://usn.ubuntu.com/3403-1/
reference_id USN-3403-1
reference_type
scores
url https://usn.ubuntu.com/3403-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2017-9835
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4c92-nxd1-m7ak
4
url VCID-6xjs-kc8z-ukb8
vulnerability_id VCID-6xjs-kc8z-ukb8
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9620.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9620.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9620
reference_id
reference_type
scores
0
value 0.00667
scoring_system epss
scoring_elements 0.71345
published_at 2026-04-26T12:55:00Z
1
value 0.00667
scoring_system epss
scoring_elements 0.71256
published_at 2026-04-13T12:55:00Z
2
value 0.00667
scoring_system epss
scoring_elements 0.71301
published_at 2026-04-16T12:55:00Z
3
value 0.00667
scoring_system epss
scoring_elements 0.71308
published_at 2026-04-18T12:55:00Z
4
value 0.00667
scoring_system epss
scoring_elements 0.71285
published_at 2026-04-21T12:55:00Z
5
value 0.00667
scoring_system epss
scoring_elements 0.71338
published_at 2026-04-24T12:55:00Z
6
value 0.00989
scoring_system epss
scoring_elements 0.76893
published_at 2026-04-11T12:55:00Z
7
value 0.00989
scoring_system epss
scoring_elements 0.76873
published_at 2026-04-12T12:55:00Z
8
value 0.00989
scoring_system epss
scoring_elements 0.76807
published_at 2026-04-01T12:55:00Z
9
value 0.00989
scoring_system epss
scoring_elements 0.76813
published_at 2026-04-02T12:55:00Z
10
value 0.00989
scoring_system epss
scoring_elements 0.76842
published_at 2026-04-04T12:55:00Z
11
value 0.00989
scoring_system epss
scoring_elements 0.76823
published_at 2026-04-07T12:55:00Z
12
value 0.00989
scoring_system epss
scoring_elements 0.76854
published_at 2026-04-08T12:55:00Z
13
value 0.00989
scoring_system epss
scoring_elements 0.76865
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9620
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9620
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1475829
reference_id 1475829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1475829
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879
reference_id 869879
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879
5
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2017-9620
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xjs-kc8z-ukb8
5
url VCID-76r8-79qa-m7h3
vulnerability_id VCID-76r8-79qa-m7h3
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19409.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19409.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19409
reference_id
reference_type
scores
0
value 0.10203
scoring_system epss
scoring_elements 0.93103
published_at 2026-04-01T12:55:00Z
1
value 0.10203
scoring_system epss
scoring_elements 0.93113
published_at 2026-04-02T12:55:00Z
2
value 0.10203
scoring_system epss
scoring_elements 0.93116
published_at 2026-04-04T12:55:00Z
3
value 0.10203
scoring_system epss
scoring_elements 0.93115
published_at 2026-04-07T12:55:00Z
4
value 0.10203
scoring_system epss
scoring_elements 0.93124
published_at 2026-04-08T12:55:00Z
5
value 0.10203
scoring_system epss
scoring_elements 0.93128
published_at 2026-04-09T12:55:00Z
6
value 0.10203
scoring_system epss
scoring_elements 0.93133
published_at 2026-04-13T12:55:00Z
7
value 0.10203
scoring_system epss
scoring_elements 0.93131
published_at 2026-04-12T12:55:00Z
8
value 0.10203
scoring_system epss
scoring_elements 0.9315
published_at 2026-04-16T12:55:00Z
9
value 0.10203
scoring_system epss
scoring_elements 0.93154
published_at 2026-04-18T12:55:00Z
10
value 0.10203
scoring_system epss
scoring_elements 0.93161
published_at 2026-04-21T12:55:00Z
11
value 0.10203
scoring_system epss
scoring_elements 0.93167
published_at 2026-04-24T12:55:00Z
12
value 0.10203
scoring_system epss
scoring_elements 0.93166
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19409
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1652583
reference_id 1652583
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1652583
10
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
11
reference_url https://access.redhat.com/errata/RHSA-2018:3834
reference_id RHSA-2018:3834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3834
12
reference_url https://usn.ubuntu.com/3831-1/
reference_id USN-3831-1
reference_type
scores
url https://usn.ubuntu.com/3831-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-19409
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76r8-79qa-m7h3
6
url VCID-cwmx-9rrx-efcp
vulnerability_id VCID-cwmx-9rrx-efcp
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15910.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15910.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-15910
reference_id
reference_type
scores
0
value 0.04834
scoring_system epss
scoring_elements 0.8948
published_at 2026-04-01T12:55:00Z
1
value 0.04834
scoring_system epss
scoring_elements 0.89484
published_at 2026-04-02T12:55:00Z
2
value 0.04834
scoring_system epss
scoring_elements 0.89496
published_at 2026-04-07T12:55:00Z
3
value 0.04834
scoring_system epss
scoring_elements 0.89512
published_at 2026-04-08T12:55:00Z
4
value 0.04834
scoring_system epss
scoring_elements 0.89516
published_at 2026-04-09T12:55:00Z
5
value 0.04834
scoring_system epss
scoring_elements 0.89524
published_at 2026-04-11T12:55:00Z
6
value 0.04834
scoring_system epss
scoring_elements 0.89521
published_at 2026-04-12T12:55:00Z
7
value 0.04834
scoring_system epss
scoring_elements 0.89517
published_at 2026-04-13T12:55:00Z
8
value 0.04834
scoring_system epss
scoring_elements 0.8953
published_at 2026-04-16T12:55:00Z
9
value 0.04834
scoring_system epss
scoring_elements 0.89532
published_at 2026-04-18T12:55:00Z
10
value 0.04834
scoring_system epss
scoring_elements 0.89529
published_at 2026-04-21T12:55:00Z
11
value 0.04834
scoring_system epss
scoring_elements 0.89544
published_at 2026-04-24T12:55:00Z
12
value 0.04834
scoring_system epss
scoring_elements 0.89548
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-15910
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1619751
reference_id 1619751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1619751
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
reference_id 907332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
17
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
18
reference_url https://access.redhat.com/errata/RHSA-2018:2918
reference_id RHSA-2018:2918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2918
19
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-15910
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cwmx-9rrx-efcp
7
url VCID-dax4-v297-afhg
vulnerability_id VCID-dax4-v297-afhg
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11714.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11714.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-11714
reference_id
reference_type
scores
0
value 0.00335
scoring_system epss
scoring_elements 0.56211
published_at 2026-04-01T12:55:00Z
1
value 0.00335
scoring_system epss
scoring_elements 0.56294
published_at 2026-04-26T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.56351
published_at 2026-04-21T12:55:00Z
3
value 0.00335
scoring_system epss
scoring_elements 0.56273
published_at 2026-04-24T12:55:00Z
4
value 0.00335
scoring_system epss
scoring_elements 0.56321
published_at 2026-04-02T12:55:00Z
5
value 0.00335
scoring_system epss
scoring_elements 0.56344
published_at 2026-04-04T12:55:00Z
6
value 0.00335
scoring_system epss
scoring_elements 0.56324
published_at 2026-04-07T12:55:00Z
7
value 0.00335
scoring_system epss
scoring_elements 0.56375
published_at 2026-04-08T12:55:00Z
8
value 0.00335
scoring_system epss
scoring_elements 0.56381
published_at 2026-04-16T12:55:00Z
9
value 0.00335
scoring_system epss
scoring_elements 0.56391
published_at 2026-04-11T12:55:00Z
10
value 0.00335
scoring_system epss
scoring_elements 0.56367
published_at 2026-04-12T12:55:00Z
11
value 0.00335
scoring_system epss
scoring_elements 0.56349
published_at 2026-04-13T12:55:00Z
12
value 0.00335
scoring_system epss
scoring_elements 0.56382
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-11714
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1476192
reference_id 1476192
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1476192
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869977
reference_id 869977
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869977
12
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
13
reference_url https://usn.ubuntu.com/3403-1/
reference_id USN-3403-1
reference_type
scores
url https://usn.ubuntu.com/3403-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2017-11714
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dax4-v297-afhg
8
url VCID-dr9w-w81e-qugn
vulnerability_id VCID-dr9w-w81e-qugn
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16802.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16802
reference_id
reference_type
scores
0
value 0.00971
scoring_system epss
scoring_elements 0.76579
published_at 2026-04-01T12:55:00Z
1
value 0.00971
scoring_system epss
scoring_elements 0.76582
published_at 2026-04-02T12:55:00Z
2
value 0.00971
scoring_system epss
scoring_elements 0.76611
published_at 2026-04-04T12:55:00Z
3
value 0.00971
scoring_system epss
scoring_elements 0.76592
published_at 2026-04-07T12:55:00Z
4
value 0.00971
scoring_system epss
scoring_elements 0.76623
published_at 2026-04-08T12:55:00Z
5
value 0.00971
scoring_system epss
scoring_elements 0.76635
published_at 2026-04-09T12:55:00Z
6
value 0.00971
scoring_system epss
scoring_elements 0.76661
published_at 2026-04-11T12:55:00Z
7
value 0.00971
scoring_system epss
scoring_elements 0.76641
published_at 2026-04-12T12:55:00Z
8
value 0.00971
scoring_system epss
scoring_elements 0.76632
published_at 2026-04-13T12:55:00Z
9
value 0.00971
scoring_system epss
scoring_elements 0.76673
published_at 2026-04-16T12:55:00Z
10
value 0.00971
scoring_system epss
scoring_elements 0.76677
published_at 2026-04-18T12:55:00Z
11
value 0.00971
scoring_system epss
scoring_elements 0.76666
published_at 2026-04-21T12:55:00Z
12
value 0.00971
scoring_system epss
scoring_elements 0.76697
published_at 2026-04-24T12:55:00Z
13
value 0.00971
scoring_system epss
scoring_elements 0.76703
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16802
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1627959
reference_id 1627959
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1627959
7
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
8
reference_url https://access.redhat.com/errata/RHSA-2018:3834
reference_id RHSA-2018:3834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3834
9
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-16802
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dr9w-w81e-qugn
9
url VCID-ehmh-tjv3-ufhe
vulnerability_id VCID-ehmh-tjv3-ufhe
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9618.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9618
reference_id
reference_type
scores
0
value 0.00885
scoring_system epss
scoring_elements 0.75506
published_at 2026-04-26T12:55:00Z
1
value 0.00885
scoring_system epss
scoring_elements 0.75431
published_at 2026-04-13T12:55:00Z
2
value 0.00885
scoring_system epss
scoring_elements 0.75473
published_at 2026-04-16T12:55:00Z
3
value 0.00885
scoring_system epss
scoring_elements 0.75479
published_at 2026-04-18T12:55:00Z
4
value 0.00885
scoring_system epss
scoring_elements 0.75468
published_at 2026-04-21T12:55:00Z
5
value 0.00885
scoring_system epss
scoring_elements 0.75502
published_at 2026-04-24T12:55:00Z
6
value 0.01382
scoring_system epss
scoring_elements 0.80317
published_at 2026-04-11T12:55:00Z
7
value 0.01382
scoring_system epss
scoring_elements 0.80302
published_at 2026-04-12T12:55:00Z
8
value 0.01382
scoring_system epss
scoring_elements 0.80245
published_at 2026-04-01T12:55:00Z
9
value 0.01382
scoring_system epss
scoring_elements 0.80252
published_at 2026-04-02T12:55:00Z
10
value 0.01382
scoring_system epss
scoring_elements 0.80272
published_at 2026-04-04T12:55:00Z
11
value 0.01382
scoring_system epss
scoring_elements 0.8026
published_at 2026-04-07T12:55:00Z
12
value 0.01382
scoring_system epss
scoring_elements 0.80288
published_at 2026-04-08T12:55:00Z
13
value 0.01382
scoring_system epss
scoring_elements 0.80298
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9618
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9618
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1475827
reference_id 1475827
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1475827
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879
reference_id 869879
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879
5
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2017-9618
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ehmh-tjv3-ufhe
10
url VCID-fzq2-pf9t-6kcp
vulnerability_id VCID-fzq2-pf9t-6kcp
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15909.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15909.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-15909
reference_id
reference_type
scores
0
value 0.02274
scoring_system epss
scoring_elements 0.84586
published_at 2026-04-01T12:55:00Z
1
value 0.02274
scoring_system epss
scoring_elements 0.846
published_at 2026-04-02T12:55:00Z
2
value 0.02274
scoring_system epss
scoring_elements 0.8462
published_at 2026-04-04T12:55:00Z
3
value 0.02274
scoring_system epss
scoring_elements 0.84622
published_at 2026-04-07T12:55:00Z
4
value 0.02274
scoring_system epss
scoring_elements 0.84644
published_at 2026-04-08T12:55:00Z
5
value 0.02274
scoring_system epss
scoring_elements 0.8465
published_at 2026-04-09T12:55:00Z
6
value 0.02274
scoring_system epss
scoring_elements 0.84668
published_at 2026-04-11T12:55:00Z
7
value 0.02274
scoring_system epss
scoring_elements 0.84663
published_at 2026-04-12T12:55:00Z
8
value 0.02274
scoring_system epss
scoring_elements 0.84658
published_at 2026-04-13T12:55:00Z
9
value 0.02274
scoring_system epss
scoring_elements 0.8468
published_at 2026-04-16T12:55:00Z
10
value 0.02274
scoring_system epss
scoring_elements 0.84681
published_at 2026-04-18T12:55:00Z
11
value 0.02274
scoring_system epss
scoring_elements 0.84682
published_at 2026-04-21T12:55:00Z
12
value 0.02274
scoring_system epss
scoring_elements 0.84709
published_at 2026-04-24T12:55:00Z
13
value 0.02274
scoring_system epss
scoring_elements 0.84719
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-15909
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1621361
reference_id 1621361
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1621361
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
reference_id 907332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
17
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
18
reference_url https://access.redhat.com/errata/RHSA-2018:3650
reference_id RHSA-2018:3650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3650
19
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-15909
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fzq2-pf9t-6kcp
11
url VCID-g57e-a8z2-k3dx
vulnerability_id VCID-g57e-a8z2-k3dx
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15911.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15911.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-15911
reference_id
reference_type
scores
0
value 0.02697
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-01T12:55:00Z
1
value 0.02697
scoring_system epss
scoring_elements 0.85817
published_at 2026-04-02T12:55:00Z
2
value 0.02697
scoring_system epss
scoring_elements 0.85835
published_at 2026-04-04T12:55:00Z
3
value 0.02697
scoring_system epss
scoring_elements 0.85839
published_at 2026-04-07T12:55:00Z
4
value 0.02697
scoring_system epss
scoring_elements 0.85857
published_at 2026-04-08T12:55:00Z
5
value 0.02697
scoring_system epss
scoring_elements 0.85867
published_at 2026-04-09T12:55:00Z
6
value 0.02697
scoring_system epss
scoring_elements 0.85882
published_at 2026-04-11T12:55:00Z
7
value 0.02697
scoring_system epss
scoring_elements 0.85879
published_at 2026-04-12T12:55:00Z
8
value 0.02697
scoring_system epss
scoring_elements 0.85874
published_at 2026-04-13T12:55:00Z
9
value 0.02697
scoring_system epss
scoring_elements 0.85893
published_at 2026-04-16T12:55:00Z
10
value 0.02697
scoring_system epss
scoring_elements 0.85897
published_at 2026-04-18T12:55:00Z
11
value 0.02697
scoring_system epss
scoring_elements 0.85889
published_at 2026-04-21T12:55:00Z
12
value 0.02697
scoring_system epss
scoring_elements 0.8591
published_at 2026-04-24T12:55:00Z
13
value 0.02697
scoring_system epss
scoring_elements 0.85919
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-15911
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1625832
reference_id 1625832
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1625832
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
reference_id 907332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
17
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
18
reference_url https://access.redhat.com/errata/RHSA-2018:3834
reference_id RHSA-2018:3834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3834
19
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-15911
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g57e-a8z2-k3dx
12
url VCID-gmkv-up69-u7c1
vulnerability_id VCID-gmkv-up69-u7c1
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9740.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9740
reference_id
reference_type
scores
0
value 0.00407
scoring_system epss
scoring_elements 0.61024
published_at 2026-04-01T12:55:00Z
1
value 0.00407
scoring_system epss
scoring_elements 0.61101
published_at 2026-04-02T12:55:00Z
2
value 0.00407
scoring_system epss
scoring_elements 0.61129
published_at 2026-04-04T12:55:00Z
3
value 0.00407
scoring_system epss
scoring_elements 0.61096
published_at 2026-04-07T12:55:00Z
4
value 0.00407
scoring_system epss
scoring_elements 0.61144
published_at 2026-04-08T12:55:00Z
5
value 0.00407
scoring_system epss
scoring_elements 0.61159
published_at 2026-04-09T12:55:00Z
6
value 0.00407
scoring_system epss
scoring_elements 0.61179
published_at 2026-04-11T12:55:00Z
7
value 0.00407
scoring_system epss
scoring_elements 0.61166
published_at 2026-04-12T12:55:00Z
8
value 0.00407
scoring_system epss
scoring_elements 0.61147
published_at 2026-04-13T12:55:00Z
9
value 0.00407
scoring_system epss
scoring_elements 0.61187
published_at 2026-04-16T12:55:00Z
10
value 0.00407
scoring_system epss
scoring_elements 0.61193
published_at 2026-04-18T12:55:00Z
11
value 0.00407
scoring_system epss
scoring_elements 0.61174
published_at 2026-04-21T12:55:00Z
12
value 0.00407
scoring_system epss
scoring_elements 0.61163
published_at 2026-04-24T12:55:00Z
13
value 0.00407
scoring_system epss
scoring_elements 0.61178
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9740
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9740
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1475836
reference_id 1475836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1475836
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879
reference_id 869879
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879
5
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2017-9740
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmkv-up69-u7c1
13
url VCID-jwv8-hkfn-a7gx
vulnerability_id VCID-jwv8-hkfn-a7gx
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16511.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16511
reference_id
reference_type
scores
0
value 0.00371
scoring_system epss
scoring_elements 0.58778
published_at 2026-04-01T12:55:00Z
1
value 0.00371
scoring_system epss
scoring_elements 0.58852
published_at 2026-04-02T12:55:00Z
2
value 0.00371
scoring_system epss
scoring_elements 0.58875
published_at 2026-04-04T12:55:00Z
3
value 0.00371
scoring_system epss
scoring_elements 0.58843
published_at 2026-04-07T12:55:00Z
4
value 0.00371
scoring_system epss
scoring_elements 0.58895
published_at 2026-04-08T12:55:00Z
5
value 0.00371
scoring_system epss
scoring_elements 0.58901
published_at 2026-04-09T12:55:00Z
6
value 0.00371
scoring_system epss
scoring_elements 0.58918
published_at 2026-04-11T12:55:00Z
7
value 0.00371
scoring_system epss
scoring_elements 0.589
published_at 2026-04-12T12:55:00Z
8
value 0.00371
scoring_system epss
scoring_elements 0.58881
published_at 2026-04-13T12:55:00Z
9
value 0.00371
scoring_system epss
scoring_elements 0.58914
published_at 2026-04-16T12:55:00Z
10
value 0.00371
scoring_system epss
scoring_elements 0.58919
published_at 2026-04-18T12:55:00Z
11
value 0.00371
scoring_system epss
scoring_elements 0.58897
published_at 2026-04-21T12:55:00Z
12
value 0.00371
scoring_system epss
scoring_elements 0.5888
published_at 2026-04-24T12:55:00Z
13
value 0.00371
scoring_system epss
scoring_elements 0.58896
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16511
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1621359
reference_id 1621359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1621359
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
reference_id 907332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
17
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
18
reference_url https://access.redhat.com/errata/RHSA-2018:3650
reference_id RHSA-2018:3650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3650
19
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-16511
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jwv8-hkfn-a7gx
14
url VCID-mp48-78e1-xqdy
vulnerability_id VCID-mp48-78e1-xqdy
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=39b1e54b2968620723bf32e96764c88797714879
reference_id
reference_type
scores
url http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=39b1e54b2968620723bf32e96764c88797714879
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10194.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10194.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10194
reference_id
reference_type
scores
0
value 0.00648
scoring_system epss
scoring_elements 0.70713
published_at 2026-04-01T12:55:00Z
1
value 0.00648
scoring_system epss
scoring_elements 0.70865
published_at 2026-04-26T12:55:00Z
2
value 0.00648
scoring_system epss
scoring_elements 0.70826
published_at 2026-04-18T12:55:00Z
3
value 0.00648
scoring_system epss
scoring_elements 0.70803
published_at 2026-04-21T12:55:00Z
4
value 0.00648
scoring_system epss
scoring_elements 0.70856
published_at 2026-04-24T12:55:00Z
5
value 0.00648
scoring_system epss
scoring_elements 0.70728
published_at 2026-04-02T12:55:00Z
6
value 0.00648
scoring_system epss
scoring_elements 0.70746
published_at 2026-04-04T12:55:00Z
7
value 0.00648
scoring_system epss
scoring_elements 0.70722
published_at 2026-04-07T12:55:00Z
8
value 0.00648
scoring_system epss
scoring_elements 0.70767
published_at 2026-04-08T12:55:00Z
9
value 0.00648
scoring_system epss
scoring_elements 0.70783
published_at 2026-04-09T12:55:00Z
10
value 0.00648
scoring_system epss
scoring_elements 0.70806
published_at 2026-04-11T12:55:00Z
11
value 0.00648
scoring_system epss
scoring_elements 0.7079
published_at 2026-04-12T12:55:00Z
12
value 0.00648
scoring_system epss
scoring_elements 0.70775
published_at 2026-04-13T12:55:00Z
13
value 0.00648
scoring_system epss
scoring_elements 0.70819
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10194
3
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=699255
reference_id
reference_type
scores
url https://bugs.ghostscript.com/show_bug.cgi?id=699255
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10194
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00028.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/04/msg00028.html
7
reference_url http://www.securitytracker.com/id/1040729
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040729
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1569108
reference_id 1569108
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1569108
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896069
reference_id 896069
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896069
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10194
reference_id CVE-2018-10194
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10194
24
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
25
reference_url https://access.redhat.com/errata/RHSA-2018:2918
reference_id RHSA-2018:2918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2918
26
reference_url https://usn.ubuntu.com/3636-1/
reference_id USN-3636-1
reference_type
scores
url https://usn.ubuntu.com/3636-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-10194
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mp48-78e1-xqdy
15
url VCID-msc6-ev6c-1bcn
vulnerability_id VCID-msc6-ev6c-1bcn
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9726.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9726.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9726
reference_id
reference_type
scores
0
value 0.00334
scoring_system epss
scoring_elements 0.56072
published_at 2026-04-01T12:55:00Z
1
value 0.00334
scoring_system epss
scoring_elements 0.56239
published_at 2026-04-09T12:55:00Z
2
value 0.00334
scoring_system epss
scoring_elements 0.56182
published_at 2026-04-07T12:55:00Z
3
value 0.00334
scoring_system epss
scoring_elements 0.56202
published_at 2026-04-04T12:55:00Z
4
value 0.00334
scoring_system epss
scoring_elements 0.56233
published_at 2026-04-08T12:55:00Z
5
value 0.00334
scoring_system epss
scoring_elements 0.56249
published_at 2026-04-11T12:55:00Z
6
value 0.00334
scoring_system epss
scoring_elements 0.56225
published_at 2026-04-12T12:55:00Z
7
value 0.0129
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-13T12:55:00Z
8
value 0.0129
scoring_system epss
scoring_elements 0.7973
published_at 2026-04-26T12:55:00Z
9
value 0.0129
scoring_system epss
scoring_elements 0.79689
published_at 2026-04-18T12:55:00Z
10
value 0.0129
scoring_system epss
scoring_elements 0.79692
published_at 2026-04-21T12:55:00Z
11
value 0.0129
scoring_system epss
scoring_elements 0.79723
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9726
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1475830
reference_id 1475830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1475830
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869915
reference_id 869915
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869915
12
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
13
reference_url https://usn.ubuntu.com/3403-1/
reference_id USN-3403-1
reference_type
scores
url https://usn.ubuntu.com/3403-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2017-9726
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-msc6-ev6c-1bcn
16
url VCID-njhw-89wt-23b1
vulnerability_id VCID-njhw-89wt-23b1
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9612.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9612.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9612
reference_id
reference_type
scores
0
value 0.00302
scoring_system epss
scoring_elements 0.53407
published_at 2026-04-01T12:55:00Z
1
value 0.00302
scoring_system epss
scoring_elements 0.53475
published_at 2026-04-09T12:55:00Z
2
value 0.00302
scoring_system epss
scoring_elements 0.53431
published_at 2026-04-02T12:55:00Z
3
value 0.00302
scoring_system epss
scoring_elements 0.53457
published_at 2026-04-04T12:55:00Z
4
value 0.00302
scoring_system epss
scoring_elements 0.53426
published_at 2026-04-07T12:55:00Z
5
value 0.00302
scoring_system epss
scoring_elements 0.53478
published_at 2026-04-08T12:55:00Z
6
value 0.00302
scoring_system epss
scoring_elements 0.53524
published_at 2026-04-11T12:55:00Z
7
value 0.00302
scoring_system epss
scoring_elements 0.53507
published_at 2026-04-12T12:55:00Z
8
value 0.0129
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-13T12:55:00Z
9
value 0.0129
scoring_system epss
scoring_elements 0.79689
published_at 2026-04-18T12:55:00Z
10
value 0.0129
scoring_system epss
scoring_elements 0.79692
published_at 2026-04-21T12:55:00Z
11
value 0.0129
scoring_system epss
scoring_elements 0.7973
published_at 2026-04-26T12:55:00Z
12
value 0.0129
scoring_system epss
scoring_elements 0.79723
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9612
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1475826
reference_id 1475826
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1475826
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869916
reference_id 869916
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869916
12
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
13
reference_url https://usn.ubuntu.com/3403-1/
reference_id USN-3403-1
reference_type
scores
url https://usn.ubuntu.com/3403-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2017-9612
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njhw-89wt-23b1
17
url VCID-p4e6-xwff-vuax
vulnerability_id VCID-p4e6-xwff-vuax
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9739.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9739.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9739
reference_id
reference_type
scores
0
value 0.00334
scoring_system epss
scoring_elements 0.56072
published_at 2026-04-01T12:55:00Z
1
value 0.00334
scoring_system epss
scoring_elements 0.56239
published_at 2026-04-09T12:55:00Z
2
value 0.00334
scoring_system epss
scoring_elements 0.56182
published_at 2026-04-07T12:55:00Z
3
value 0.00334
scoring_system epss
scoring_elements 0.56202
published_at 2026-04-04T12:55:00Z
4
value 0.00334
scoring_system epss
scoring_elements 0.56233
published_at 2026-04-08T12:55:00Z
5
value 0.00334
scoring_system epss
scoring_elements 0.56249
published_at 2026-04-11T12:55:00Z
6
value 0.00334
scoring_system epss
scoring_elements 0.56225
published_at 2026-04-12T12:55:00Z
7
value 0.0129
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-13T12:55:00Z
8
value 0.0129
scoring_system epss
scoring_elements 0.7973
published_at 2026-04-26T12:55:00Z
9
value 0.0129
scoring_system epss
scoring_elements 0.79689
published_at 2026-04-18T12:55:00Z
10
value 0.0129
scoring_system epss
scoring_elements 0.79692
published_at 2026-04-21T12:55:00Z
11
value 0.0129
scoring_system epss
scoring_elements 0.79723
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9739
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1475834
reference_id 1475834
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1475834
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869910
reference_id 869910
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869910
12
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
13
reference_url https://usn.ubuntu.com/3403-1/
reference_id USN-3403-1
reference_type
scores
url https://usn.ubuntu.com/3403-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2017-9739
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p4e6-xwff-vuax
18
url VCID-p9qf-vrde-ruhj
vulnerability_id VCID-p9qf-vrde-ruhj
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16509.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16509.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16509
reference_id
reference_type
scores
0
value 0.91758
scoring_system epss
scoring_elements 0.99681
published_at 2026-04-01T12:55:00Z
1
value 0.91758
scoring_system epss
scoring_elements 0.99682
published_at 2026-04-02T12:55:00Z
2
value 0.91758
scoring_system epss
scoring_elements 0.99683
published_at 2026-04-04T12:55:00Z
3
value 0.91758
scoring_system epss
scoring_elements 0.99684
published_at 2026-04-07T12:55:00Z
4
value 0.91758
scoring_system epss
scoring_elements 0.99685
published_at 2026-04-09T12:55:00Z
5
value 0.91758
scoring_system epss
scoring_elements 0.99686
published_at 2026-04-13T12:55:00Z
6
value 0.91758
scoring_system epss
scoring_elements 0.99687
published_at 2026-04-16T12:55:00Z
7
value 0.91758
scoring_system epss
scoring_elements 0.99689
published_at 2026-04-21T12:55:00Z
8
value 0.91758
scoring_system epss
scoring_elements 0.9969
published_at 2026-04-24T12:55:00Z
9
value 0.91758
scoring_system epss
scoring_elements 0.99691
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16509
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1619748
reference_id 1619748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1619748
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
reference_id 907332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45369.rb
reference_id CVE-2018-16509
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45369.rb
9
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/7f20178a0572176d2d57118e1e5cc3ef9c434656/modules/exploits/multi/fileformat/ghostscript_failed_restore.rb
reference_id CVE-2018-16509
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/7f20178a0572176d2d57118e1e5cc3ef9c434656/modules/exploits/multi/fileformat/ghostscript_failed_restore.rb
10
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
11
reference_url https://access.redhat.com/errata/RHSA-2018:2918
reference_id RHSA-2018:2918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2918
12
reference_url https://access.redhat.com/errata/RHSA-2018:3760
reference_id RHSA-2018:3760
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3760
13
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-16509
risk_score 10.0
exploitability 2.0
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9qf-vrde-ruhj
19
url VCID-szch-k4pu-wubc
vulnerability_id VCID-szch-k4pu-wubc
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9619.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9619
reference_id
reference_type
scores
0
value 0.00623
scoring_system epss
scoring_elements 0.70076
published_at 2026-04-01T12:55:00Z
1
value 0.00623
scoring_system epss
scoring_elements 0.70089
published_at 2026-04-02T12:55:00Z
2
value 0.00623
scoring_system epss
scoring_elements 0.70104
published_at 2026-04-04T12:55:00Z
3
value 0.00623
scoring_system epss
scoring_elements 0.70081
published_at 2026-04-07T12:55:00Z
4
value 0.00623
scoring_system epss
scoring_elements 0.70128
published_at 2026-04-08T12:55:00Z
5
value 0.00623
scoring_system epss
scoring_elements 0.70145
published_at 2026-04-09T12:55:00Z
6
value 0.00623
scoring_system epss
scoring_elements 0.70168
published_at 2026-04-11T12:55:00Z
7
value 0.00623
scoring_system epss
scoring_elements 0.70153
published_at 2026-04-12T12:55:00Z
8
value 0.00623
scoring_system epss
scoring_elements 0.7014
published_at 2026-04-13T12:55:00Z
9
value 0.00623
scoring_system epss
scoring_elements 0.70184
published_at 2026-04-16T12:55:00Z
10
value 0.00623
scoring_system epss
scoring_elements 0.70193
published_at 2026-04-18T12:55:00Z
11
value 0.00623
scoring_system epss
scoring_elements 0.70172
published_at 2026-04-21T12:55:00Z
12
value 0.00623
scoring_system epss
scoring_elements 0.70223
published_at 2026-04-24T12:55:00Z
13
value 0.00623
scoring_system epss
scoring_elements 0.7023
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9619
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9619
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1475828
reference_id 1475828
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1475828
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879
reference_id 869879
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879
5
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2017-9619
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-szch-k4pu-wubc
20
url VCID-tug2-npfa-nkaj
vulnerability_id VCID-tug2-npfa-nkaj
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url http://git.ghostscript.com/?p=ghostpdl.git%3Bh=8210a2864372723b49c526e2b102fdc00c9c4699
reference_id
reference_type
scores
url http://git.ghostscript.com/?p=ghostpdl.git%3Bh=8210a2864372723b49c526e2b102fdc00c9c4699
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7948.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7948.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7948
reference_id
reference_type
scores
0
value 0.00226
scoring_system epss
scoring_elements 0.4525
published_at 2026-04-01T12:55:00Z
1
value 0.00226
scoring_system epss
scoring_elements 0.45255
published_at 2026-04-26T12:55:00Z
2
value 0.00226
scoring_system epss
scoring_elements 0.45388
published_at 2026-04-18T12:55:00Z
3
value 0.00226
scoring_system epss
scoring_elements 0.45339
published_at 2026-04-21T12:55:00Z
4
value 0.00226
scoring_system epss
scoring_elements 0.45249
published_at 2026-04-24T12:55:00Z
5
value 0.00226
scoring_system epss
scoring_elements 0.45331
published_at 2026-04-02T12:55:00Z
6
value 0.00226
scoring_system epss
scoring_elements 0.45352
published_at 2026-04-04T12:55:00Z
7
value 0.00226
scoring_system epss
scoring_elements 0.45295
published_at 2026-04-07T12:55:00Z
8
value 0.00226
scoring_system epss
scoring_elements 0.4535
published_at 2026-04-09T12:55:00Z
9
value 0.00226
scoring_system epss
scoring_elements 0.45372
published_at 2026-04-11T12:55:00Z
10
value 0.00226
scoring_system epss
scoring_elements 0.4534
published_at 2026-04-12T12:55:00Z
11
value 0.00226
scoring_system epss
scoring_elements 0.45342
published_at 2026-04-13T12:55:00Z
12
value 0.00226
scoring_system epss
scoring_elements 0.45393
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7948
3
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=697762
reference_id
reference_type
scores
url https://bugs.ghostscript.com/show_bug.cgi?id=697762
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7948
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1444944
reference_id 1444944
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1444944
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7948
reference_id CVE-2017-7948
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7948
9
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2017-7948
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tug2-npfa-nkaj
21
url VCID-u9m8-3kch-ubft
vulnerability_id VCID-u9m8-3kch-ubft
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16510.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16510.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16510
reference_id
reference_type
scores
0
value 0.00223
scoring_system epss
scoring_elements 0.44837
published_at 2026-04-01T12:55:00Z
1
value 0.00223
scoring_system epss
scoring_elements 0.4492
published_at 2026-04-02T12:55:00Z
2
value 0.00223
scoring_system epss
scoring_elements 0.4494
published_at 2026-04-04T12:55:00Z
3
value 0.00223
scoring_system epss
scoring_elements 0.44882
published_at 2026-04-07T12:55:00Z
4
value 0.00223
scoring_system epss
scoring_elements 0.44934
published_at 2026-04-08T12:55:00Z
5
value 0.00223
scoring_system epss
scoring_elements 0.44935
published_at 2026-04-09T12:55:00Z
6
value 0.00223
scoring_system epss
scoring_elements 0.44957
published_at 2026-04-11T12:55:00Z
7
value 0.00223
scoring_system epss
scoring_elements 0.44926
published_at 2026-04-12T12:55:00Z
8
value 0.00223
scoring_system epss
scoring_elements 0.44928
published_at 2026-04-13T12:55:00Z
9
value 0.00223
scoring_system epss
scoring_elements 0.44979
published_at 2026-04-16T12:55:00Z
10
value 0.00223
scoring_system epss
scoring_elements 0.44973
published_at 2026-04-18T12:55:00Z
11
value 0.00223
scoring_system epss
scoring_elements 0.44924
published_at 2026-04-21T12:55:00Z
12
value 0.00223
scoring_system epss
scoring_elements 0.44833
published_at 2026-04-24T12:55:00Z
13
value 0.00223
scoring_system epss
scoring_elements 0.4484
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16510
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16510
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1625836
reference_id 1625836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1625836
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908304
reference_id 908304
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908304
6
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
7
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
8
reference_url https://usn.ubuntu.com/3773-1/
reference_id USN-3773-1
reference_type
scores
url https://usn.ubuntu.com/3773-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-16510
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9m8-3kch-ubft
22
url VCID-v38d-2sr1-7qcf
vulnerability_id VCID-v38d-2sr1-7qcf
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16539.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16539.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16539
reference_id
reference_type
scores
0
value 0.00352
scoring_system epss
scoring_elements 0.57499
published_at 2026-04-01T12:55:00Z
1
value 0.00352
scoring_system epss
scoring_elements 0.57583
published_at 2026-04-02T12:55:00Z
2
value 0.00352
scoring_system epss
scoring_elements 0.57604
published_at 2026-04-04T12:55:00Z
3
value 0.00352
scoring_system epss
scoring_elements 0.57579
published_at 2026-04-07T12:55:00Z
4
value 0.00352
scoring_system epss
scoring_elements 0.57633
published_at 2026-04-08T12:55:00Z
5
value 0.00352
scoring_system epss
scoring_elements 0.57637
published_at 2026-04-18T12:55:00Z
6
value 0.00352
scoring_system epss
scoring_elements 0.57651
published_at 2026-04-11T12:55:00Z
7
value 0.00352
scoring_system epss
scoring_elements 0.57632
published_at 2026-04-12T12:55:00Z
8
value 0.00352
scoring_system epss
scoring_elements 0.57611
published_at 2026-04-13T12:55:00Z
9
value 0.00352
scoring_system epss
scoring_elements 0.57641
published_at 2026-04-16T12:55:00Z
10
value 0.00352
scoring_system epss
scoring_elements 0.57615
published_at 2026-04-21T12:55:00Z
11
value 0.00352
scoring_system epss
scoring_elements 0.57574
published_at 2026-04-24T12:55:00Z
12
value 0.00352
scoring_system epss
scoring_elements 0.57593
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16539
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1625839
reference_id 1625839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1625839
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
reference_id 907332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
17
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
18
reference_url https://access.redhat.com/errata/RHSA-2018:3650
reference_id RHSA-2018:3650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3650
19
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-16539
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v38d-2sr1-7qcf
23
url VCID-v7ug-73tf-e7fu
vulnerability_id VCID-v7ug-73tf-e7fu
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16513.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16513.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16513
reference_id
reference_type
scores
0
value 0.00255
scoring_system epss
scoring_elements 0.48773
published_at 2026-04-01T12:55:00Z
1
value 0.00255
scoring_system epss
scoring_elements 0.48812
published_at 2026-04-02T12:55:00Z
2
value 0.00255
scoring_system epss
scoring_elements 0.48837
published_at 2026-04-04T12:55:00Z
3
value 0.00255
scoring_system epss
scoring_elements 0.48792
published_at 2026-04-07T12:55:00Z
4
value 0.00255
scoring_system epss
scoring_elements 0.48846
published_at 2026-04-08T12:55:00Z
5
value 0.00255
scoring_system epss
scoring_elements 0.48842
published_at 2026-04-13T12:55:00Z
6
value 0.00255
scoring_system epss
scoring_elements 0.48859
published_at 2026-04-11T12:55:00Z
7
value 0.00255
scoring_system epss
scoring_elements 0.48833
published_at 2026-04-12T12:55:00Z
8
value 0.00255
scoring_system epss
scoring_elements 0.48891
published_at 2026-04-16T12:55:00Z
9
value 0.00255
scoring_system epss
scoring_elements 0.48887
published_at 2026-04-18T12:55:00Z
10
value 0.00255
scoring_system epss
scoring_elements 0.48847
published_at 2026-04-21T12:55:00Z
11
value 0.00255
scoring_system epss
scoring_elements 0.48835
published_at 2026-04-24T12:55:00Z
12
value 0.00255
scoring_system epss
scoring_elements 0.48845
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16513
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1619750
reference_id 1619750
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1619750
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
reference_id 907332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
17
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
18
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-16513
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v7ug-73tf-e7fu
24
url VCID-wpws-24gy-j7g8
vulnerability_id VCID-wpws-24gy-j7g8
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16541.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16541
reference_id
reference_type
scores
0
value 0.00454
scoring_system epss
scoring_elements 0.63721
published_at 2026-04-01T12:55:00Z
1
value 0.00454
scoring_system epss
scoring_elements 0.63783
published_at 2026-04-02T12:55:00Z
2
value 0.00454
scoring_system epss
scoring_elements 0.63809
published_at 2026-04-04T12:55:00Z
3
value 0.00454
scoring_system epss
scoring_elements 0.63766
published_at 2026-04-07T12:55:00Z
4
value 0.00454
scoring_system epss
scoring_elements 0.63817
published_at 2026-04-08T12:55:00Z
5
value 0.00454
scoring_system epss
scoring_elements 0.63835
published_at 2026-04-09T12:55:00Z
6
value 0.00454
scoring_system epss
scoring_elements 0.63849
published_at 2026-04-11T12:55:00Z
7
value 0.00454
scoring_system epss
scoring_elements 0.63834
published_at 2026-04-21T12:55:00Z
8
value 0.00454
scoring_system epss
scoring_elements 0.63801
published_at 2026-04-13T12:55:00Z
9
value 0.00454
scoring_system epss
scoring_elements 0.63836
published_at 2026-04-16T12:55:00Z
10
value 0.00454
scoring_system epss
scoring_elements 0.63845
published_at 2026-04-18T12:55:00Z
11
value 0.00454
scoring_system epss
scoring_elements 0.63851
published_at 2026-04-24T12:55:00Z
12
value 0.00454
scoring_system epss
scoring_elements 0.63863
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16541
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1625846
reference_id 1625846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1625846
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
reference_id 907332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
17
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
18
reference_url https://access.redhat.com/errata/RHSA-2018:3834
reference_id RHSA-2018:3834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3834
19
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-16541
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpws-24gy-j7g8
25
url VCID-wtcr-fwz7-j7bk
vulnerability_id VCID-wtcr-fwz7-j7bk
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9727.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9727
reference_id
reference_type
scores
0
value 0.00334
scoring_system epss
scoring_elements 0.56072
published_at 2026-04-01T12:55:00Z
1
value 0.00334
scoring_system epss
scoring_elements 0.56239
published_at 2026-04-09T12:55:00Z
2
value 0.00334
scoring_system epss
scoring_elements 0.56182
published_at 2026-04-07T12:55:00Z
3
value 0.00334
scoring_system epss
scoring_elements 0.56202
published_at 2026-04-04T12:55:00Z
4
value 0.00334
scoring_system epss
scoring_elements 0.56233
published_at 2026-04-08T12:55:00Z
5
value 0.00334
scoring_system epss
scoring_elements 0.56249
published_at 2026-04-11T12:55:00Z
6
value 0.00334
scoring_system epss
scoring_elements 0.56225
published_at 2026-04-12T12:55:00Z
7
value 0.0129
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-13T12:55:00Z
8
value 0.0129
scoring_system epss
scoring_elements 0.7973
published_at 2026-04-26T12:55:00Z
9
value 0.0129
scoring_system epss
scoring_elements 0.79689
published_at 2026-04-18T12:55:00Z
10
value 0.0129
scoring_system epss
scoring_elements 0.79692
published_at 2026-04-21T12:55:00Z
11
value 0.0129
scoring_system epss
scoring_elements 0.79723
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1475833
reference_id 1475833
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1475833
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869913
reference_id 869913
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869913
12
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
13
reference_url https://usn.ubuntu.com/3403-1/
reference_id USN-3403-1
reference_type
scores
url https://usn.ubuntu.com/3403-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2017-9727
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wtcr-fwz7-j7bk
26
url VCID-x3e7-xtzh-gugf
vulnerability_id VCID-x3e7-xtzh-gugf
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15908.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15908.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-15908
reference_id
reference_type
scores
0
value 0.00234
scoring_system epss
scoring_elements 0.46236
published_at 2026-04-01T12:55:00Z
1
value 0.00234
scoring_system epss
scoring_elements 0.46277
published_at 2026-04-02T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.46296
published_at 2026-04-04T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.46242
published_at 2026-04-07T12:55:00Z
4
value 0.00234
scoring_system epss
scoring_elements 0.46298
published_at 2026-04-09T12:55:00Z
5
value 0.00234
scoring_system epss
scoring_elements 0.46322
published_at 2026-04-11T12:55:00Z
6
value 0.00234
scoring_system epss
scoring_elements 0.46294
published_at 2026-04-12T12:55:00Z
7
value 0.00234
scoring_system epss
scoring_elements 0.46303
published_at 2026-04-13T12:55:00Z
8
value 0.00234
scoring_system epss
scoring_elements 0.4636
published_at 2026-04-16T12:55:00Z
9
value 0.00234
scoring_system epss
scoring_elements 0.46356
published_at 2026-04-18T12:55:00Z
10
value 0.00234
scoring_system epss
scoring_elements 0.463
published_at 2026-04-21T12:55:00Z
11
value 0.00234
scoring_system epss
scoring_elements 0.46282
published_at 2026-04-24T12:55:00Z
12
value 0.00234
scoring_system epss
scoring_elements 0.46292
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-15908
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1619756
reference_id 1619756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1619756
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
reference_id 907332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
17
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
18
reference_url https://access.redhat.com/errata/RHSA-2018:3650
reference_id RHSA-2018:3650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3650
19
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-15908
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x3e7-xtzh-gugf
27
url VCID-xsnz-35n8-dyet
vulnerability_id VCID-xsnz-35n8-dyet
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16543.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16543.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16543
reference_id
reference_type
scores
0
value 0.00219
scoring_system epss
scoring_elements 0.445
published_at 2026-04-01T12:55:00Z
1
value 0.00219
scoring_system epss
scoring_elements 0.44575
published_at 2026-04-02T12:55:00Z
2
value 0.00219
scoring_system epss
scoring_elements 0.44597
published_at 2026-04-04T12:55:00Z
3
value 0.00219
scoring_system epss
scoring_elements 0.44533
published_at 2026-04-07T12:55:00Z
4
value 0.00219
scoring_system epss
scoring_elements 0.44584
published_at 2026-04-08T12:55:00Z
5
value 0.00219
scoring_system epss
scoring_elements 0.44589
published_at 2026-04-09T12:55:00Z
6
value 0.00219
scoring_system epss
scoring_elements 0.44605
published_at 2026-04-11T12:55:00Z
7
value 0.00219
scoring_system epss
scoring_elements 0.44576
published_at 2026-04-12T12:55:00Z
8
value 0.00219
scoring_system epss
scoring_elements 0.44577
published_at 2026-04-13T12:55:00Z
9
value 0.00219
scoring_system epss
scoring_elements 0.44633
published_at 2026-04-16T12:55:00Z
10
value 0.00219
scoring_system epss
scoring_elements 0.44625
published_at 2026-04-18T12:55:00Z
11
value 0.00219
scoring_system epss
scoring_elements 0.44556
published_at 2026-04-21T12:55:00Z
12
value 0.00219
scoring_system epss
scoring_elements 0.44469
published_at 2026-04-24T12:55:00Z
13
value 0.00219
scoring_system epss
scoring_elements 0.44473
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16543
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1625851
reference_id 1625851
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1625851
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908303
reference_id 908303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908303
17
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
18
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-16543
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xsnz-35n8-dyet
28
url VCID-y99q-qn92-j7gt
vulnerability_id VCID-y99q-qn92-j7gt
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16542.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16542.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16542
reference_id
reference_type
scores
0
value 0.00426
scoring_system epss
scoring_elements 0.6214
published_at 2026-04-01T12:55:00Z
1
value 0.00426
scoring_system epss
scoring_elements 0.622
published_at 2026-04-02T12:55:00Z
2
value 0.00426
scoring_system epss
scoring_elements 0.6223
published_at 2026-04-04T12:55:00Z
3
value 0.00426
scoring_system epss
scoring_elements 0.62197
published_at 2026-04-07T12:55:00Z
4
value 0.00426
scoring_system epss
scoring_elements 0.62247
published_at 2026-04-08T12:55:00Z
5
value 0.00426
scoring_system epss
scoring_elements 0.62264
published_at 2026-04-09T12:55:00Z
6
value 0.00426
scoring_system epss
scoring_elements 0.62283
published_at 2026-04-11T12:55:00Z
7
value 0.00426
scoring_system epss
scoring_elements 0.62272
published_at 2026-04-12T12:55:00Z
8
value 0.00426
scoring_system epss
scoring_elements 0.6225
published_at 2026-04-13T12:55:00Z
9
value 0.00426
scoring_system epss
scoring_elements 0.62296
published_at 2026-04-16T12:55:00Z
10
value 0.00426
scoring_system epss
scoring_elements 0.62303
published_at 2026-04-18T12:55:00Z
11
value 0.00426
scoring_system epss
scoring_elements 0.62288
published_at 2026-04-21T12:55:00Z
12
value 0.00426
scoring_system epss
scoring_elements 0.62298
published_at 2026-04-24T12:55:00Z
13
value 0.00426
scoring_system epss
scoring_elements 0.62314
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16542
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1621363
reference_id 1621363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1621363
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
reference_id 907332
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332
17
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
18
reference_url https://access.redhat.com/errata/RHSA-2018:2918
reference_id RHSA-2018:2918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2918
19
reference_url https://usn.ubuntu.com/3768-1/
reference_id USN-3768-1
reference_type
scores
url https://usn.ubuntu.com/3768-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-16542
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y99q-qn92-j7gt
29
url VCID-zbxc-g59q-vyab
vulnerability_id VCID-zbxc-g59q-vyab
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18284.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18284.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18284
reference_id
reference_type
scores
0
value 0.00331
scoring_system epss
scoring_elements 0.55939
published_at 2026-04-01T12:55:00Z
1
value 0.00331
scoring_system epss
scoring_elements 0.56031
published_at 2026-04-26T12:55:00Z
2
value 0.00331
scoring_system epss
scoring_elements 0.56085
published_at 2026-04-21T12:55:00Z
3
value 0.00331
scoring_system epss
scoring_elements 0.5601
published_at 2026-04-24T12:55:00Z
4
value 0.00331
scoring_system epss
scoring_elements 0.56051
published_at 2026-04-02T12:55:00Z
5
value 0.00331
scoring_system epss
scoring_elements 0.56071
published_at 2026-04-04T12:55:00Z
6
value 0.00331
scoring_system epss
scoring_elements 0.5605
published_at 2026-04-07T12:55:00Z
7
value 0.00331
scoring_system epss
scoring_elements 0.56101
published_at 2026-04-08T12:55:00Z
8
value 0.00331
scoring_system epss
scoring_elements 0.56105
published_at 2026-04-09T12:55:00Z
9
value 0.00331
scoring_system epss
scoring_elements 0.56116
published_at 2026-04-11T12:55:00Z
10
value 0.00331
scoring_system epss
scoring_elements 0.56093
published_at 2026-04-12T12:55:00Z
11
value 0.00331
scoring_system epss
scoring_elements 0.56076
published_at 2026-04-13T12:55:00Z
12
value 0.00331
scoring_system epss
scoring_elements 0.56112
published_at 2026-04-16T12:55:00Z
13
value 0.00331
scoring_system epss
scoring_elements 0.56114
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18284
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642940
reference_id 1642940
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642940
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911175
reference_id 911175
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911175
9
reference_url https://security.archlinux.org/ASA-201811-3
reference_id ASA-201811-3
reference_type
scores
url https://security.archlinux.org/ASA-201811-3
10
reference_url https://security.archlinux.org/AVG-786
reference_id AVG-786
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-786
11
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
12
reference_url https://access.redhat.com/errata/RHSA-2018:3834
reference_id RHSA-2018:3834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3834
13
reference_url https://usn.ubuntu.com/3803-1/
reference_id USN-3803-1
reference_type
scores
url https://usn.ubuntu.com/3803-1/
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2018-18284
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zbxc-g59q-vyab
30
url VCID-zw1d-wcpb-rfbp
vulnerability_id VCID-zw1d-wcpb-rfbp
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9610.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9610.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9610
reference_id
reference_type
scores
0
value 0.00407
scoring_system epss
scoring_elements 0.61024
published_at 2026-04-01T12:55:00Z
1
value 0.00407
scoring_system epss
scoring_elements 0.61101
published_at 2026-04-02T12:55:00Z
2
value 0.00407
scoring_system epss
scoring_elements 0.61129
published_at 2026-04-04T12:55:00Z
3
value 0.00407
scoring_system epss
scoring_elements 0.61096
published_at 2026-04-07T12:55:00Z
4
value 0.00407
scoring_system epss
scoring_elements 0.61144
published_at 2026-04-08T12:55:00Z
5
value 0.00407
scoring_system epss
scoring_elements 0.61159
published_at 2026-04-09T12:55:00Z
6
value 0.00407
scoring_system epss
scoring_elements 0.61179
published_at 2026-04-11T12:55:00Z
7
value 0.00407
scoring_system epss
scoring_elements 0.61166
published_at 2026-04-12T12:55:00Z
8
value 0.00407
scoring_system epss
scoring_elements 0.61147
published_at 2026-04-13T12:55:00Z
9
value 0.00407
scoring_system epss
scoring_elements 0.61187
published_at 2026-04-16T12:55:00Z
10
value 0.00407
scoring_system epss
scoring_elements 0.61193
published_at 2026-04-18T12:55:00Z
11
value 0.00407
scoring_system epss
scoring_elements 0.61174
published_at 2026-04-21T12:55:00Z
12
value 0.00407
scoring_system epss
scoring_elements 0.61163
published_at 2026-04-24T12:55:00Z
13
value 0.00407
scoring_system epss
scoring_elements 0.61178
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9610
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9610
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1475824
reference_id 1475824
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1475824
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879
reference_id 869879
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879
5
reference_url https://security.gentoo.org/glsa/201811-12
reference_id GLSA-201811-12
reference_type
scores
url https://security.gentoo.org/glsa/201811-12
fixed_packages
0
url pkg:ebuild/app-text/ghostscript-gpl@9.26
purl pkg:ebuild/app-text/ghostscript-gpl@9.26
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26
aliases CVE-2017-9610
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zw1d-wcpb-rfbp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.26