Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ghostscript@0?distro=trixie
Typedeb
Namespacedebian
Nameghostscript
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.61.dfsg.1~svn8187-1.1
Latest_non_vulnerable_version10.07.0~dfsg-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3kq9-v371-j3ew
vulnerability_id VCID-3kq9-v371-j3ew
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27834.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27834
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06092
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06177
published_at 2026-04-11T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06185
published_at 2026-04-09T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06172
published_at 2026-04-12T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06164
published_at 2026-04-13T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06123
published_at 2026-04-16T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06134
published_at 2026-04-18T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06287
published_at 2026-04-21T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06122
published_at 2026-04-04T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06106
published_at 2026-04-07T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06147
published_at 2026-04-08T12:55:00Z
11
value 0.00102
scoring_system epss
scoring_elements 0.27683
published_at 2026-04-26T12:55:00Z
12
value 0.00102
scoring_system epss
scoring_elements 0.27608
published_at 2026-04-29T12:55:00Z
13
value 0.00111
scoring_system epss
scoring_elements 0.29296
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27834
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2354948
reference_id 2354948
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2354948
4
reference_url https://security.gentoo.org/glsa/202508-02
reference_id GLSA-202508-02
reference_type
scores
url https://security.gentoo.org/glsa/202508-02
5
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708253
reference_id show_bug.cgi?id=708253
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:36:54Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708253
6
reference_url https://usn.ubuntu.com/7378-1/
reference_id USN-7378-1
reference_type
scores
url https://usn.ubuntu.com/7378-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2025-27834
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3kq9-v371-j3ew
1
url VCID-4ahm-1cab-auba
vulnerability_id VCID-4ahm-1cab-auba
summary ghostscript: Incomplete fix for CVE-2020-16305
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4042.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4042.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4042
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10471
published_at 2026-04-29T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10517
published_at 2026-04-02T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10412
published_at 2026-04-18T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.1054
published_at 2026-04-21T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10525
published_at 2026-04-24T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10524
published_at 2026-04-26T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10587
published_at 2026-04-04T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10449
published_at 2026-04-07T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10523
published_at 2026-04-08T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10589
published_at 2026-04-09T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10618
published_at 2026-04-11T12:55:00Z
11
value 0.00036
scoring_system epss
scoring_elements 0.10585
published_at 2026-04-12T12:55:00Z
12
value 0.00036
scoring_system epss
scoring_elements 0.10562
published_at 2026-04-13T12:55:00Z
13
value 0.00036
scoring_system epss
scoring_elements 0.1043
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4042
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2228151
reference_id 2228151
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:58:03Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2228151
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
9
reference_url https://access.redhat.com/security/cve/CVE-2023-4042
reference_id CVE-2023-4042
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:58:03Z/
url https://access.redhat.com/security/cve/CVE-2023-4042
10
reference_url https://access.redhat.com/errata/RHSA-2023:7053
reference_id RHSA-2023:7053
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:58:03Z/
url https://access.redhat.com/errata/RHSA-2023:7053
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2023-4042
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ahm-1cab-auba
2
url VCID-5b3p-nax3-tuc5
vulnerability_id VCID-5b3p-nax3-tuc5
summary ghostscript: stack-based buffer overflow in the pdfi_apply_filter()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29506.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29506.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-29506
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.35571
published_at 2026-04-29T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.36009
published_at 2026-04-11T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.35971
published_at 2026-04-18T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.35946
published_at 2026-04-13T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.35986
published_at 2026-04-16T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.35921
published_at 2026-04-21T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.35692
published_at 2026-04-24T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.3566
published_at 2026-04-26T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36067
published_at 2026-04-02T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.36096
published_at 2026-04-04T12:55:00Z
10
value 0.00153
scoring_system epss
scoring_elements 0.3593
published_at 2026-04-07T12:55:00Z
11
value 0.00153
scoring_system epss
scoring_elements 0.3598
published_at 2026-04-08T12:55:00Z
12
value 0.00153
scoring_system epss
scoring_elements 0.36003
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-29506
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295626
reference_id 2295626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295626
4
reference_url https://www.openwall.com/lists/oss-security/2024/07/03/7
reference_id 7
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T14:18:42Z/
url https://www.openwall.com/lists/oss-security/2024/07/03/7
5
reference_url https://git.ghostscript.com/?p=ghostpdl.git%3Bh=77dc7f699beba606937b7ea23b50cf5974fa64b1
reference_id ?p=ghostpdl.git%3Bh=77dc7f699beba606937b7ea23b50cf5974fa64b1
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T14:18:42Z/
url https://git.ghostscript.com/?p=ghostpdl.git%3Bh=77dc7f699beba606937b7ea23b50cf5974fa64b1
6
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707510
reference_id show_bug.cgi?id=707510
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T14:18:42Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707510
7
reference_url https://usn.ubuntu.com/6897-1/
reference_id USN-6897-1
reference_type
scores
url https://usn.ubuntu.com/6897-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.0~dfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2024-29506
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5b3p-nax3-tuc5
3
url VCID-9q8n-jfqs-bkg6
vulnerability_id VCID-9q8n-jfqs-bkg6
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46952.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-46952
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20061
published_at 2026-04-29T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.2022
published_at 2026-04-21T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20099
published_at 2026-04-24T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20094
published_at 2026-04-26T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21684
published_at 2026-04-16T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21741
published_at 2026-04-12T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21691
published_at 2026-04-18T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21829
published_at 2026-04-02T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21882
published_at 2026-04-04T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21634
published_at 2026-04-07T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21711
published_at 2026-04-08T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21768
published_at 2026-04-09T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.21781
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-46952
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325041
reference_id 2325041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325041
4
reference_url https://security.gentoo.org/glsa/202501-06
reference_id GLSA-202501-06
reference_type
scores
url https://security.gentoo.org/glsa/202501-06
5
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b1f0827c30f59a2dcbc8a39e42cace7a1de35f7f
reference_id ?id=b1f0827c30f59a2dcbc8a39e42cace7a1de35f7f
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:27:55Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b1f0827c30f59a2dcbc8a39e42cace7a1de35f7f
6
reference_url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
reference_id News.html
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:27:55Z/
url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:4362
reference_id RHSA-2025:4362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4362
8
reference_url https://access.redhat.com/errata/RHSA-2025:7422
reference_id RHSA-2025:7422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7422
9
reference_url https://access.redhat.com/errata/RHSA-2025:7499
reference_id RHSA-2025:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7499
10
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708001
reference_id show_bug.cgi?id=708001
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:27:55Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708001
11
reference_url https://usn.ubuntu.com/7103-1/
reference_id USN-7103-1
reference_type
scores
url https://usn.ubuntu.com/7103-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2024-46952
risk_score 3.8
exploitability 0.5
weighted_severity 7.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9q8n-jfqs-bkg6
4
url VCID-9sqj-kk7j-43fg
vulnerability_id VCID-9sqj-kk7j-43fg
summary ghostscript: heap buffer overflow via the PDFPassword parameter
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29509.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29509.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-29509
reference_id
reference_type
scores
0
value 0.0215
scoring_system epss
scoring_elements 0.84309
published_at 2026-04-29T12:55:00Z
1
value 0.0215
scoring_system epss
scoring_elements 0.84246
published_at 2026-04-12T12:55:00Z
2
value 0.0215
scoring_system epss
scoring_elements 0.84243
published_at 2026-04-13T12:55:00Z
3
value 0.0215
scoring_system epss
scoring_elements 0.84265
published_at 2026-04-16T12:55:00Z
4
value 0.0215
scoring_system epss
scoring_elements 0.84266
published_at 2026-04-18T12:55:00Z
5
value 0.0215
scoring_system epss
scoring_elements 0.8427
published_at 2026-04-21T12:55:00Z
6
value 0.0215
scoring_system epss
scoring_elements 0.84295
published_at 2026-04-24T12:55:00Z
7
value 0.0215
scoring_system epss
scoring_elements 0.84304
published_at 2026-04-26T12:55:00Z
8
value 0.0215
scoring_system epss
scoring_elements 0.84187
published_at 2026-04-02T12:55:00Z
9
value 0.0215
scoring_system epss
scoring_elements 0.84205
published_at 2026-04-04T12:55:00Z
10
value 0.0215
scoring_system epss
scoring_elements 0.84206
published_at 2026-04-07T12:55:00Z
11
value 0.0215
scoring_system epss
scoring_elements 0.84227
published_at 2026-04-08T12:55:00Z
12
value 0.0215
scoring_system epss
scoring_elements 0.84233
published_at 2026-04-09T12:55:00Z
13
value 0.0215
scoring_system epss
scoring_elements 0.84251
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-29509
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295628
reference_id 2295628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295628
4
reference_url https://www.openwall.com/lists/oss-security/2024/07/03/7
reference_id 7
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:36:26Z/
url https://www.openwall.com/lists/oss-security/2024/07/03/7
5
reference_url https://git.ghostscript.com/?p=ghostpdl.git%3Bh=917b3a71fb20748965254631199ad98210d6c2fb
reference_id ?p=ghostpdl.git%3Bh=917b3a71fb20748965254631199ad98210d6c2fb
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:36:26Z/
url https://git.ghostscript.com/?p=ghostpdl.git%3Bh=917b3a71fb20748965254631199ad98210d6c2fb
6
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707510
reference_id show_bug.cgi?id=707510
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:36:26Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707510
7
reference_url https://usn.ubuntu.com/6897-1/
reference_id USN-6897-1
reference_type
scores
url https://usn.ubuntu.com/6897-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.0~dfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2024-29509
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9sqj-kk7j-43fg
5
url VCID-dyk7-kdb2-e3ap
vulnerability_id VCID-dyk7-kdb2-e3ap
summary Heap-based buffer overflow in gdevwpr2.c in Ghostscript 9.04, when processing the OutputFile device parameter, allows user-assisted remote attackers to execute arbitrary code via a long file name in a PostScript document. NOTE: as of 20120314, the developer was not able to reproduce the issue and disputed it
references
0
reference_url http://bugs.ghostscript.com/show_bug.cgi?id=692856
reference_id
reference_type
scores
url http://bugs.ghostscript.com/show_bug.cgi?id=692856
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4875
reference_id
reference_type
scores
0
value 0.09321
scoring_system epss
scoring_elements 0.92773
published_at 2026-04-29T12:55:00Z
1
value 0.09321
scoring_system epss
scoring_elements 0.92727
published_at 2026-04-01T12:55:00Z
2
value 0.09321
scoring_system epss
scoring_elements 0.92734
published_at 2026-04-02T12:55:00Z
3
value 0.09321
scoring_system epss
scoring_elements 0.9274
published_at 2026-04-04T12:55:00Z
4
value 0.09321
scoring_system epss
scoring_elements 0.92737
published_at 2026-04-07T12:55:00Z
5
value 0.09321
scoring_system epss
scoring_elements 0.92747
published_at 2026-04-08T12:55:00Z
6
value 0.09321
scoring_system epss
scoring_elements 0.92751
published_at 2026-04-09T12:55:00Z
7
value 0.09321
scoring_system epss
scoring_elements 0.92757
published_at 2026-04-11T12:55:00Z
8
value 0.09321
scoring_system epss
scoring_elements 0.92755
published_at 2026-04-12T12:55:00Z
9
value 0.09321
scoring_system epss
scoring_elements 0.92756
published_at 2026-04-13T12:55:00Z
10
value 0.09321
scoring_system epss
scoring_elements 0.92767
published_at 2026-04-18T12:55:00Z
11
value 0.09321
scoring_system epss
scoring_elements 0.92771
published_at 2026-04-21T12:55:00Z
12
value 0.09321
scoring_system epss
scoring_elements 0.92778
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4875
2
reference_url http://secunia.com/advisories/47855
reference_id
reference_type
scores
url http://secunia.com/advisories/47855
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/74554
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/74554
4
reference_url http://www.securityfocus.com/bid/52864
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/52864
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:9.04:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4875
reference_id CVE-2012-4875
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-4875
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2012-4875
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dyk7-kdb2-e3ap
6
url VCID-fqa1-u16c-qyha
vulnerability_id VCID-fqa1-u16c-qyha
summary ghostscript: stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29507.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29507.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-29507
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.2987
published_at 2026-04-29T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.3022
published_at 2026-04-12T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30173
published_at 2026-04-13T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30188
published_at 2026-04-16T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30169
published_at 2026-04-18T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30125
published_at 2026-04-21T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30055
published_at 2026-04-24T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.29939
published_at 2026-04-26T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30299
published_at 2026-04-02T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30348
published_at 2026-04-04T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.30165
published_at 2026-04-07T12:55:00Z
11
value 0.00115
scoring_system epss
scoring_elements 0.30225
published_at 2026-04-08T12:55:00Z
12
value 0.00115
scoring_system epss
scoring_elements 0.3026
published_at 2026-04-09T12:55:00Z
13
value 0.00115
scoring_system epss
scoring_elements 0.30263
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-29507
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295647
reference_id 2295647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295647
4
reference_url https://www.openwall.com/lists/oss-security/2024/07/03/7
reference_id 7
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:10:58Z/
url https://www.openwall.com/lists/oss-security/2024/07/03/7
5
reference_url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=7745dbe24514
reference_id ?p=ghostpdl.git%3Ba=commitdiff%3Bh=7745dbe24514
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:10:58Z/
url https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=7745dbe24514
6
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707510
reference_id show_bug.cgi?id=707510
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:10:58Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707510
7
reference_url https://usn.ubuntu.com/6897-1/
reference_id USN-6897-1
reference_type
scores
url https://usn.ubuntu.com/6897-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.0~dfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2024-29507
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fqa1-u16c-qyha
7
url VCID-jxhs-q6yu-muft
vulnerability_id VCID-jxhs-q6yu-muft
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27837.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27837.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27837
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.42412
published_at 2026-04-29T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42495
published_at 2026-04-26T12:55:00Z
2
value 0.00395
scoring_system epss
scoring_elements 0.60321
published_at 2026-04-02T12:55:00Z
3
value 0.00395
scoring_system epss
scoring_elements 0.60316
published_at 2026-04-07T12:55:00Z
4
value 0.00395
scoring_system epss
scoring_elements 0.60365
published_at 2026-04-08T12:55:00Z
5
value 0.00395
scoring_system epss
scoring_elements 0.60381
published_at 2026-04-09T12:55:00Z
6
value 0.00395
scoring_system epss
scoring_elements 0.60401
published_at 2026-04-11T12:55:00Z
7
value 0.00395
scoring_system epss
scoring_elements 0.60388
published_at 2026-04-12T12:55:00Z
8
value 0.00395
scoring_system epss
scoring_elements 0.60368
published_at 2026-04-13T12:55:00Z
9
value 0.00395
scoring_system epss
scoring_elements 0.60409
published_at 2026-04-21T12:55:00Z
10
value 0.00395
scoring_system epss
scoring_elements 0.60417
published_at 2026-04-18T12:55:00Z
11
value 0.00395
scoring_system epss
scoring_elements 0.60347
published_at 2026-04-04T12:55:00Z
12
value 0.00468
scoring_system epss
scoring_elements 0.64522
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27837
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2354961
reference_id 2354961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2354961
4
reference_url https://security.gentoo.org/glsa/202508-02
reference_id GLSA-202508-02
reference_type
scores
url https://security.gentoo.org/glsa/202508-02
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2025-27837
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jxhs-q6yu-muft
8
url VCID-kbfn-852g-fker
vulnerability_id VCID-kbfn-852g-fker
summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which can resulting in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6196.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6196
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.57417
published_at 2026-04-01T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57501
published_at 2026-04-02T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57522
published_at 2026-04-04T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57498
published_at 2026-04-07T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.5755
published_at 2026-04-08T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57554
published_at 2026-04-09T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.5757
published_at 2026-04-11T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57549
published_at 2026-04-12T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.57527
published_at 2026-04-13T12:55:00Z
9
value 0.00351
scoring_system epss
scoring_elements 0.57555
published_at 2026-04-16T12:55:00Z
10
value 0.00351
scoring_system epss
scoring_elements 0.57551
published_at 2026-04-18T12:55:00Z
11
value 0.00351
scoring_system epss
scoring_elements 0.57531
published_at 2026-04-21T12:55:00Z
12
value 0.00351
scoring_system epss
scoring_elements 0.5749
published_at 2026-04-24T12:55:00Z
13
value 0.00351
scoring_system epss
scoring_elements 0.57509
published_at 2026-04-26T12:55:00Z
14
value 0.00351
scoring_system epss
scoring_elements 0.57488
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6196
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1427440
reference_id 1427440
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1427440
4
reference_url https://security.gentoo.org/glsa/201708-06
reference_id GLSA-201708-06
reference_type
scores
url https://security.gentoo.org/glsa/201708-06
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2017-6196
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbfn-852g-fker
9
url VCID-kck6-wj6h-3ybr
vulnerability_id VCID-kck6-wj6h-3ybr
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46646.json
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46646.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-46646
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.2509
published_at 2026-04-02T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24801
published_at 2026-04-29T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.2499
published_at 2026-04-12T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24936
published_at 2026-04-13T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24949
published_at 2026-04-16T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24941
published_at 2026-04-18T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24915
published_at 2026-04-21T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24846
published_at 2026-04-26T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.25128
published_at 2026-04-04T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24903
published_at 2026-04-07T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24972
published_at 2026-04-08T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.25017
published_at 2026-04-09T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.25031
published_at 2026-04-11T12:55:00Z
13
value 0.00089
scoring_system epss
scoring_elements 0.25164
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-46646
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2362446
reference_id 2362446
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2362446
4
reference_url https://security.gentoo.org/glsa/202508-02
reference_id GLSA-202508-02
reference_type
scores
url https://security.gentoo.org/glsa/202508-02
5
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f14ea81e6c3d2f51593f23cdf13c4679a18f1a3f
reference_id ?id=f14ea81e6c3d2f51593f23cdf13c4679a18f1a3f
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-29T13:44:40Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f14ea81e6c3d2f51593f23cdf13c4679a18f1a3f
6
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708311
reference_id show_bug.cgi?id=708311
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-29T13:44:40Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708311
7
reference_url https://usn.ubuntu.com/7473-1/
reference_id USN-7473-1
reference_type
scores
url https://usn.ubuntu.com/7473-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2025-46646
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kck6-wj6h-3ybr
10
url VCID-p7nb-9g3f-2bf3
vulnerability_id VCID-p7nb-9g3f-2bf3
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46954.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-46954
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.31875
published_at 2026-04-29T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32258
published_at 2026-04-13T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.32293
published_at 2026-04-16T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32273
published_at 2026-04-18T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32243
published_at 2026-04-21T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32081
published_at 2026-04-24T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.31956
published_at 2026-04-26T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32385
published_at 2026-04-02T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32422
published_at 2026-04-04T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32247
published_at 2026-04-07T12:55:00Z
10
value 0.00129
scoring_system epss
scoring_elements 0.32296
published_at 2026-04-08T12:55:00Z
11
value 0.00129
scoring_system epss
scoring_elements 0.32326
published_at 2026-04-11T12:55:00Z
12
value 0.00129
scoring_system epss
scoring_elements 0.32288
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-46954
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325044
reference_id 2325044
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325044
3
reference_url https://security.gentoo.org/glsa/202501-06
reference_id GLSA-202501-06
reference_type
scores
url https://security.gentoo.org/glsa/202501-06
4
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=55f587dd039282316f512e1bea64218fd991f934
reference_id ?id=55f587dd039282316f512e1bea64218fd991f934
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:24:52Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=55f587dd039282316f512e1bea64218fd991f934
5
reference_url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
reference_id News.html
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:24:52Z/
url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:4362
reference_id RHSA-2025:4362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4362
7
reference_url https://access.redhat.com/errata/RHSA-2025:7422
reference_id RHSA-2025:7422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7422
8
reference_url https://access.redhat.com/errata/RHSA-2025:7499
reference_id RHSA-2025:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7499
9
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707788
reference_id show_bug.cgi?id=707788
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:24:52Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707788
10
reference_url https://usn.ubuntu.com/7103-1/
reference_id USN-7103-1
reference_type
scores
url https://usn.ubuntu.com/7103-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2024-46954
risk_score 3.8
exploitability 0.5
weighted_severity 7.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p7nb-9g3f-2bf3
11
url VCID-pwas-b3sw-guav
vulnerability_id VCID-pwas-b3sw-guav
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27833.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27833
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09356
published_at 2026-04-02T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09453
published_at 2026-04-11T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.0944
published_at 2026-04-09T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09426
published_at 2026-04-12T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09412
published_at 2026-04-13T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09304
published_at 2026-04-16T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09306
published_at 2026-04-18T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09451
published_at 2026-04-21T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09407
published_at 2026-04-04T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09318
published_at 2026-04-07T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09392
published_at 2026-04-08T12:55:00Z
11
value 0.00117
scoring_system epss
scoring_elements 0.30205
published_at 2026-04-26T12:55:00Z
12
value 0.00117
scoring_system epss
scoring_elements 0.30125
published_at 2026-04-29T12:55:00Z
13
value 0.00128
scoring_system epss
scoring_elements 0.31953
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27833
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2354954
reference_id 2354954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2354954
4
reference_url https://security.gentoo.org/glsa/202508-02
reference_id GLSA-202508-02
reference_type
scores
url https://security.gentoo.org/glsa/202508-02
5
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708259
reference_id show_bug.cgi?id=708259
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:36:49Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708259
6
reference_url https://usn.ubuntu.com/7378-1/
reference_id USN-7378-1
reference_type
scores
url https://usn.ubuntu.com/7378-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2025-27833
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwas-b3sw-guav
12
url VCID-tfdu-yxt7-87fw
vulnerability_id VCID-tfdu-yxt7-87fw
summary ghostscript: NULL pointer dereference in the pfd14_pop_transparency_group function
references
0
reference_url http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=d621292fb2c8157d9899dcd83fd04dd250e30fe4
reference_id
reference_type
scores
url http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=d621292fb2c8157d9899dcd83fd04dd250e30fe4
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10218.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10218.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10218
reference_id
reference_type
scores
0
value 0.00391
scoring_system epss
scoring_elements 0.60027
published_at 2026-04-01T12:55:00Z
1
value 0.00391
scoring_system epss
scoring_elements 0.60159
published_at 2026-04-29T12:55:00Z
2
value 0.00391
scoring_system epss
scoring_elements 0.60198
published_at 2026-04-18T12:55:00Z
3
value 0.00391
scoring_system epss
scoring_elements 0.60156
published_at 2026-04-24T12:55:00Z
4
value 0.00391
scoring_system epss
scoring_elements 0.60173
published_at 2026-04-26T12:55:00Z
5
value 0.00391
scoring_system epss
scoring_elements 0.60105
published_at 2026-04-02T12:55:00Z
6
value 0.00391
scoring_system epss
scoring_elements 0.60129
published_at 2026-04-04T12:55:00Z
7
value 0.00391
scoring_system epss
scoring_elements 0.60098
published_at 2026-04-07T12:55:00Z
8
value 0.00391
scoring_system epss
scoring_elements 0.60148
published_at 2026-04-08T12:55:00Z
9
value 0.00391
scoring_system epss
scoring_elements 0.60162
published_at 2026-04-09T12:55:00Z
10
value 0.00391
scoring_system epss
scoring_elements 0.60184
published_at 2026-04-21T12:55:00Z
11
value 0.00391
scoring_system epss
scoring_elements 0.6017
published_at 2026-04-12T12:55:00Z
12
value 0.00391
scoring_system epss
scoring_elements 0.60152
published_at 2026-04-13T12:55:00Z
13
value 0.00391
scoring_system epss
scoring_elements 0.60191
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10218
3
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=697444
reference_id
reference_type
scores
url https://bugs.ghostscript.com/show_bug.cgi?id=697444
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1441568
reference_id 1441568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1441568
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-10218
reference_id CVE-2016-10218
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-10218
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2016-10218
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tfdu-yxt7-87fw
13
url VCID-wj1v-tg7c-8ydn
vulnerability_id VCID-wj1v-tg7c-8ydn
summary ghostscript: dangling pointer in gdev_prn_open_printer_seekable()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46751.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46751.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46751
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29589
published_at 2026-04-02T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29638
published_at 2026-04-04T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.2946
published_at 2026-04-07T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29522
published_at 2026-04-08T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29562
published_at 2026-04-09T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29564
published_at 2026-04-11T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29519
published_at 2026-04-12T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29467
published_at 2026-04-13T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29485
published_at 2026-04-16T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29458
published_at 2026-04-18T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29412
published_at 2026-04-21T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29296
published_at 2026-04-24T12:55:00Z
12
value 0.00111
scoring_system epss
scoring_elements 0.29184
published_at 2026-04-26T12:55:00Z
13
value 0.00111
scoring_system epss
scoring_elements 0.29117
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46751
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253365
reference_id 2253365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253365
4
reference_url https://access.redhat.com/errata/RHSA-2025:4362
reference_id RHSA-2025:4362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4362
5
reference_url https://access.redhat.com/errata/RHSA-2025:7422
reference_id RHSA-2025:7422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7422
6
reference_url https://usn.ubuntu.com/6551-1/
reference_id USN-6551-1
reference_type
scores
url https://usn.ubuntu.com/6551-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.02.1~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.02.1~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.02.1~dfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2023-46751
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wj1v-tg7c-8ydn
14
url VCID-wy22-ngrc-dbf7
vulnerability_id VCID-wy22-ngrc-dbf7
summary ghostscript: incomplete fix for CVE-2018-16509
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16863.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16863.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16863
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24364
published_at 2026-04-01T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.2449
published_at 2026-04-02T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24523
published_at 2026-04-04T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24305
published_at 2026-04-07T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24373
published_at 2026-04-08T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24417
published_at 2026-04-09T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24434
published_at 2026-04-11T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24391
published_at 2026-04-12T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24335
published_at 2026-04-13T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24352
published_at 2026-04-16T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.24341
published_at 2026-04-18T12:55:00Z
11
value 0.00083
scoring_system epss
scoring_elements 0.24313
published_at 2026-04-21T12:55:00Z
12
value 0.00083
scoring_system epss
scoring_elements 0.24187
published_at 2026-04-24T12:55:00Z
13
value 0.00083
scoring_system epss
scoring_elements 0.24174
published_at 2026-04-26T12:55:00Z
14
value 0.00083
scoring_system epss
scoring_elements 0.24134
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16863
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1652893
reference_id 1652893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1652893
4
reference_url https://access.redhat.com/errata/RHSA-2018:3761
reference_id RHSA-2018:3761
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3761
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2018-16863
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wy22-ngrc-dbf7
15
url VCID-zcsu-syur-kbet
vulnerability_id VCID-zcsu-syur-kbet
summary Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2085.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2085.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2085
reference_id
reference_type
scores
0
value 0.00142
scoring_system epss
scoring_elements 0.34561
published_at 2026-04-02T12:55:00Z
1
value 0.00142
scoring_system epss
scoring_elements 0.34587
published_at 2026-04-04T12:55:00Z
2
value 0.00142
scoring_system epss
scoring_elements 0.34456
published_at 2026-04-07T12:55:00Z
3
value 0.00142
scoring_system epss
scoring_elements 0.34499
published_at 2026-04-08T12:55:00Z
4
value 0.00142
scoring_system epss
scoring_elements 0.34527
published_at 2026-04-09T12:55:00Z
5
value 0.00142
scoring_system epss
scoring_elements 0.3453
published_at 2026-04-11T12:55:00Z
6
value 0.00142
scoring_system epss
scoring_elements 0.34491
published_at 2026-04-12T12:55:00Z
7
value 0.00142
scoring_system epss
scoring_elements 0.34467
published_at 2026-04-13T12:55:00Z
8
value 0.00142
scoring_system epss
scoring_elements 0.34502
published_at 2026-04-16T12:55:00Z
9
value 0.00142
scoring_system epss
scoring_elements 0.34488
published_at 2026-04-18T12:55:00Z
10
value 0.00142
scoring_system epss
scoring_elements 0.34448
published_at 2026-04-21T12:55:00Z
11
value 0.00142
scoring_system epss
scoring_elements 0.34073
published_at 2026-04-24T12:55:00Z
12
value 0.00142
scoring_system epss
scoring_elements 0.34054
published_at 2026-04-26T12:55:00Z
13
value 0.00142
scoring_system epss
scoring_elements 0.33969
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2085
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2095261
reference_id 2095261
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2095261
4
reference_url https://security.gentoo.org/glsa/202211-11
reference_id GLSA-202211-11
reference_type
scores
url https://security.gentoo.org/glsa/202211-11
5
reference_url https://security.gentoo.org/glsa/202309-03
reference_id GLSA-202309-03
reference_type
scores
url https://security.gentoo.org/glsa/202309-03
6
reference_url https://usn.ubuntu.com/5643-1/
reference_id USN-5643-1
reference_type
scores
url https://usn.ubuntu.com/5643-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@9.56.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@9.56.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.56.0~dfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2022-2085
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcsu-syur-kbet
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie