Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ghostscript@8.64~dfsg-2?distro=trixie
Typedeb
Namespacedebian
Nameghostscript
Version8.64~dfsg-2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.70~dfsg-1
Latest_non_vulnerable_version10.07.0~dfsg-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-273p-y942-ekes
vulnerability_id VCID-273p-y942-ekes
summary
Multiple memory management errors in JasPer could result in
    execution of arbitrary code or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4517.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4517.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4517
reference_id
reference_type
scores
0
value 0.4213
scoring_system epss
scoring_elements 0.97415
published_at 2026-04-01T12:55:00Z
1
value 0.4213
scoring_system epss
scoring_elements 0.97422
published_at 2026-04-02T12:55:00Z
2
value 0.4213
scoring_system epss
scoring_elements 0.97426
published_at 2026-04-04T12:55:00Z
3
value 0.4213
scoring_system epss
scoring_elements 0.97427
published_at 2026-04-07T12:55:00Z
4
value 0.4213
scoring_system epss
scoring_elements 0.97434
published_at 2026-04-08T12:55:00Z
5
value 0.4213
scoring_system epss
scoring_elements 0.97435
published_at 2026-04-09T12:55:00Z
6
value 0.4213
scoring_system epss
scoring_elements 0.97438
published_at 2026-04-11T12:55:00Z
7
value 0.4213
scoring_system epss
scoring_elements 0.9744
published_at 2026-04-13T12:55:00Z
8
value 0.4213
scoring_system epss
scoring_elements 0.97448
published_at 2026-04-16T12:55:00Z
9
value 0.4213
scoring_system epss
scoring_elements 0.97453
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4517
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html
reference_id 071458.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html
reference_id 071561.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html
5
reference_url http://secunia.com/advisories/47193
reference_id 47193
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://secunia.com/advisories/47193
6
reference_url http://secunia.com/advisories/47306
reference_id 47306
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://secunia.com/advisories/47306
7
reference_url http://secunia.com/advisories/47353
reference_id 47353
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://secunia.com/advisories/47353
8
reference_url http://www.securityfocus.com/bid/50992
reference_id 50992
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://www.securityfocus.com/bid/50992
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/71701
reference_id 71701
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url https://exchange.xforce.ibmcloud.com/vulnerabilities/71701
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=747726
reference_id 747726
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=747726
11
reference_url http://osvdb.org/77596
reference_id 77596
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://osvdb.org/77596
12
reference_url http://www.kb.cert.org/vuls/id/887409
reference_id 887409
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://www.kb.cert.org/vuls/id/887409
13
reference_url https://security.archlinux.org/AVG-99
reference_id AVG-99
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-99
14
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
reference_id cpujan2012-366304.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
15
reference_url http://www.debian.org/security/2011/dsa-2371
reference_id dsa-2371
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://www.debian.org/security/2011/dsa-2371
16
reference_url https://security.gentoo.org/glsa/201201-10
reference_id GLSA-201201-10
reference_type
scores
url https://security.gentoo.org/glsa/201201-10
17
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html
18
reference_url https://access.redhat.com/errata/RHSA-2011:1807
reference_id RHSA-2011:1807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1807
19
reference_url http://www.redhat.com/support/errata/RHSA-2011-1807.html
reference_id RHSA-2011-1807.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://www.redhat.com/support/errata/RHSA-2011-1807.html
20
reference_url https://access.redhat.com/errata/RHSA-2011:1811
reference_id RHSA-2011:1811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1811
21
reference_url http://www.redhat.com/support/errata/RHSA-2011-1811.html
reference_id RHSA-2011-1811.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://www.redhat.com/support/errata/RHSA-2011-1811.html
22
reference_url https://access.redhat.com/errata/RHSA-2015:0698
reference_id RHSA-2015:0698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0698
23
reference_url https://usn.ubuntu.com/1315-1/
reference_id USN-1315-1
reference_type
scores
url https://usn.ubuntu.com/1315-1/
24
reference_url http://www.ubuntu.com/usn/USN-1315-1
reference_id USN-1315-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/
url http://www.ubuntu.com/usn/USN-1315-1
25
reference_url https://usn.ubuntu.com/1317-1/
reference_id USN-1317-1
reference_type
scores
url https://usn.ubuntu.com/1317-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@8.64~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@8.64~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2011-4517
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-273p-y942-ekes
1
url VCID-2hkv-yn4v-6kcy
vulnerability_id VCID-2hkv-yn4v-6kcy
summary
Multiple memory management errors in JasPer could result in
    execution of arbitrary code or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4516.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4516.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4516
reference_id
reference_type
scores
0
value 0.47823
scoring_system epss
scoring_elements 0.97721
published_at 2026-04-21T12:55:00Z
1
value 0.47823
scoring_system epss
scoring_elements 0.9769
published_at 2026-04-01T12:55:00Z
2
value 0.47823
scoring_system epss
scoring_elements 0.97696
published_at 2026-04-02T12:55:00Z
3
value 0.47823
scoring_system epss
scoring_elements 0.97698
published_at 2026-04-04T12:55:00Z
4
value 0.47823
scoring_system epss
scoring_elements 0.97697
published_at 2026-04-07T12:55:00Z
5
value 0.47823
scoring_system epss
scoring_elements 0.97702
published_at 2026-04-08T12:55:00Z
6
value 0.47823
scoring_system epss
scoring_elements 0.97705
published_at 2026-04-09T12:55:00Z
7
value 0.47823
scoring_system epss
scoring_elements 0.97708
published_at 2026-04-11T12:55:00Z
8
value 0.47823
scoring_system epss
scoring_elements 0.9771
published_at 2026-04-12T12:55:00Z
9
value 0.47823
scoring_system epss
scoring_elements 0.97712
published_at 2026-04-13T12:55:00Z
10
value 0.47823
scoring_system epss
scoring_elements 0.97717
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4516
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=747726
reference_id 747726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=747726
4
reference_url https://security.archlinux.org/AVG-99
reference_id AVG-99
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-99
5
reference_url https://security.gentoo.org/glsa/201201-10
reference_id GLSA-201201-10
reference_type
scores
url https://security.gentoo.org/glsa/201201-10
6
reference_url https://access.redhat.com/errata/RHSA-2011:1807
reference_id RHSA-2011:1807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1807
7
reference_url https://access.redhat.com/errata/RHSA-2011:1811
reference_id RHSA-2011:1811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1811
8
reference_url https://access.redhat.com/errata/RHSA-2015:0698
reference_id RHSA-2015:0698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0698
9
reference_url https://usn.ubuntu.com/1315-1/
reference_id USN-1315-1
reference_type
scores
url https://usn.ubuntu.com/1315-1/
10
reference_url https://usn.ubuntu.com/1317-1/
reference_id USN-1317-1
reference_type
scores
url https://usn.ubuntu.com/1317-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@8.64~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@8.64~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2011-4516
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2hkv-yn4v-6kcy
2
url VCID-932v-xwug-nbfy
vulnerability_id VCID-932v-xwug-nbfy
summary
Multiple memory management errors in JasPer might lead to execution of
    arbitrary code via jpeg2k files.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=222819
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=222819
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-0698.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0698.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3520.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3520.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3520
reference_id
reference_type
scores
0
value 0.02999
scoring_system epss
scoring_elements 0.86574
published_at 2026-04-21T12:55:00Z
1
value 0.02999
scoring_system epss
scoring_elements 0.86581
published_at 2026-04-18T12:55:00Z
2
value 0.02999
scoring_system epss
scoring_elements 0.86501
published_at 2026-04-01T12:55:00Z
3
value 0.02999
scoring_system epss
scoring_elements 0.86511
published_at 2026-04-02T12:55:00Z
4
value 0.02999
scoring_system epss
scoring_elements 0.8653
published_at 2026-04-04T12:55:00Z
5
value 0.02999
scoring_system epss
scoring_elements 0.86528
published_at 2026-04-07T12:55:00Z
6
value 0.02999
scoring_system epss
scoring_elements 0.86548
published_at 2026-04-08T12:55:00Z
7
value 0.02999
scoring_system epss
scoring_elements 0.86558
published_at 2026-04-09T12:55:00Z
8
value 0.02999
scoring_system epss
scoring_elements 0.86573
published_at 2026-04-11T12:55:00Z
9
value 0.02999
scoring_system epss
scoring_elements 0.86569
published_at 2026-04-12T12:55:00Z
10
value 0.02999
scoring_system epss
scoring_elements 0.86563
published_at 2026-04-13T12:55:00Z
11
value 0.02999
scoring_system epss
scoring_elements 0.86576
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3520
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520
5
reference_url http://secunia.com/advisories/33173
reference_id
reference_type
scores
url http://secunia.com/advisories/33173
6
reference_url http://secunia.com/advisories/34391
reference_id
reference_type
scores
url http://secunia.com/advisories/34391
7
reference_url http://security.gentoo.org/glsa/glsa-200812-18.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-18.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45621
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45621
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10141
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10141
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:142
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:144
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:164
13
reference_url http://www.redhat.com/support/errata/RHSA-2009-0012.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0012.html
14
reference_url http://www.securityfocus.com/bid/31470
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31470
15
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
16
reference_url http://www.ubuntu.com/usn/USN-742-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-742-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=461476
reference_id 461476
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=461476
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778
reference_id 559778
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778
19
reference_url https://security.archlinux.org/AVG-99
reference_id AVG-99
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-99
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3520
reference_id CVE-2008-3520
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3520
22
reference_url https://security.gentoo.org/glsa/200812-18
reference_id GLSA-200812-18
reference_type
scores
url https://security.gentoo.org/glsa/200812-18
23
reference_url https://access.redhat.com/errata/RHSA-2009:0012
reference_id RHSA-2009:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0012
24
reference_url https://access.redhat.com/errata/RHSA-2015:0698
reference_id RHSA-2015:0698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0698
25
reference_url https://usn.ubuntu.com/1317-1/
reference_id USN-1317-1
reference_type
scores
url https://usn.ubuntu.com/1317-1/
26
reference_url https://usn.ubuntu.com/742-1/
reference_id USN-742-1
reference_type
scores
url https://usn.ubuntu.com/742-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@8.64~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@8.64~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2008-3520
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-932v-xwug-nbfy
3
url VCID-tqtm-achn-z3fg
vulnerability_id VCID-tqtm-achn-z3fg
summary
Multiple memory management errors in JasPer might lead to execution of
    arbitrary code via jpeg2k files.
references
0
reference_url http://bugs.gentoo.org/attachment.cgi?id=163282&action=view
reference_id
reference_type
scores
url http://bugs.gentoo.org/attachment.cgi?id=163282&action=view
1
reference_url http://bugs.gentoo.org/show_bug.cgi?id=222819
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=222819
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-0698.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0698.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3522.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3522.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3522
reference_id
reference_type
scores
0
value 0.0425
scoring_system epss
scoring_elements 0.88817
published_at 2026-04-21T12:55:00Z
1
value 0.0425
scoring_system epss
scoring_elements 0.8882
published_at 2026-04-18T12:55:00Z
2
value 0.0425
scoring_system epss
scoring_elements 0.88753
published_at 2026-04-01T12:55:00Z
3
value 0.0425
scoring_system epss
scoring_elements 0.88762
published_at 2026-04-02T12:55:00Z
4
value 0.0425
scoring_system epss
scoring_elements 0.88777
published_at 2026-04-04T12:55:00Z
5
value 0.0425
scoring_system epss
scoring_elements 0.88779
published_at 2026-04-07T12:55:00Z
6
value 0.0425
scoring_system epss
scoring_elements 0.88796
published_at 2026-04-08T12:55:00Z
7
value 0.0425
scoring_system epss
scoring_elements 0.88801
published_at 2026-04-09T12:55:00Z
8
value 0.0425
scoring_system epss
scoring_elements 0.88813
published_at 2026-04-11T12:55:00Z
9
value 0.0425
scoring_system epss
scoring_elements 0.88808
published_at 2026-04-13T12:55:00Z
10
value 0.0425
scoring_system epss
scoring_elements 0.88822
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522
6
reference_url http://secunia.com/advisories/33173
reference_id
reference_type
scores
url http://secunia.com/advisories/33173
7
reference_url http://secunia.com/advisories/34391
reference_id
reference_type
scores
url http://secunia.com/advisories/34391
8
reference_url http://security.gentoo.org/glsa/glsa-200812-18.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-18.xml
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/45623
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/45623
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:142
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:144
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:144
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:164
13
reference_url http://www.securityfocus.com/bid/31470
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31470
14
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
15
reference_url http://www.ubuntu.com/usn/USN-742-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-742-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=461478
reference_id 461478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=461478
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778
reference_id 559778
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778
18
reference_url https://security.archlinux.org/AVG-99
reference_id AVG-99
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-99
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3522
reference_id CVE-2008-3522
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3522
22
reference_url https://security.gentoo.org/glsa/200812-18
reference_id GLSA-200812-18
reference_type
scores
url https://security.gentoo.org/glsa/200812-18
23
reference_url https://access.redhat.com/errata/RHSA-2015:0698
reference_id RHSA-2015:0698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0698
24
reference_url https://usn.ubuntu.com/1317-1/
reference_id USN-1317-1
reference_type
scores
url https://usn.ubuntu.com/1317-1/
25
reference_url https://usn.ubuntu.com/742-1/
reference_id USN-742-1
reference_type
scores
url https://usn.ubuntu.com/742-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@8.64~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@8.64~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2008-3522
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tqtm-achn-z3fg
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-2%3Fdistro=trixie