Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/923060?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "ghostscript", "version": "9.22~dfsg-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "9.22~dfsg-2.1", "latest_non_vulnerable_version": "10.07.0~dfsg-2", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51897?format=api", "vulnerability_id": "VCID-1mjs-khds-v3hb", "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n worst of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9611.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9611.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9611", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60107", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60272", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.6025", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60232", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60184", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60209", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60178", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60228", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60263", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475825", "reference_id": "1475825", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475825" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869917", "reference_id": "869917", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869917" }, { "reference_url": "https://security.gentoo.org/glsa/201811-12", "reference_id": "GLSA-201811-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-12" }, { "reference_url": "https://usn.ubuntu.com/3403-1/", "reference_id": "USN-3403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-9611" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1mjs-khds-v3hb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51909?format=api", "vulnerability_id": "VCID-4c92-nxd1-m7ak", "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n worst of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9835.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9835.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9835", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.51944", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52094", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52071", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52054", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.51992", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52019", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.51985", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52039", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00286", "scoring_system": "epss", "scoring_elements": "0.52088", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9835" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475837", "reference_id": "1475837", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475837" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869907", "reference_id": "869907", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869907" }, { "reference_url": "https://security.gentoo.org/glsa/201811-12", "reference_id": "GLSA-201811-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-12" }, { "reference_url": "https://usn.ubuntu.com/3403-1/", "reference_id": "USN-3403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-9835" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4c92-nxd1-m7ak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51903?format=api", "vulnerability_id": "VCID-6xjs-kc8z-ukb8", "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n worst of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9620.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9620.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9620", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71301", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71256", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76842", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76823", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76865", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76893", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76873", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76807", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76813", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9620" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475829", "reference_id": "1475829", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475829" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879", "reference_id": "869879", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879" }, { "reference_url": "https://security.gentoo.org/glsa/201811-12", "reference_id": "GLSA-201811-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-12" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-9620" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xjs-kc8z-ukb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51894?format=api", "vulnerability_id": "VCID-dax4-v297-afhg", "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n worst of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11714.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11714.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11714", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56211", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56391", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56367", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56321", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56324", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56375", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56381", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1476192", "reference_id": "1476192", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1476192" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869977", "reference_id": "869977", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869977" }, { "reference_url": "https://security.gentoo.org/glsa/201811-12", "reference_id": "GLSA-201811-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-12" }, { "reference_url": "https://usn.ubuntu.com/3403-1/", "reference_id": "USN-3403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-11714" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dax4-v297-afhg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51900?format=api", "vulnerability_id": "VCID-ehmh-tjv3-ufhe", "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n worst of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9618.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9618.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9618", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00885", "scoring_system": "epss", "scoring_elements": "0.75473", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00885", "scoring_system": "epss", "scoring_elements": "0.75431", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80272", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.8026", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80288", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80298", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80317", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80302", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80245", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01382", "scoring_system": "epss", "scoring_elements": "0.80252", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9618" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475827", "reference_id": "1475827", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475827" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879", "reference_id": "869879", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879" }, { "reference_url": "https://security.gentoo.org/glsa/201811-12", "reference_id": "GLSA-201811-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-12" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-9618" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ehmh-tjv3-ufhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51908?format=api", "vulnerability_id": "VCID-gmkv-up69-u7c1", "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n worst of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9740.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9740.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9740", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61024", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61101", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61129", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61144", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61159", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61179", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61166", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61147", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61187", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9740" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475836", "reference_id": "1475836", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475836" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879", "reference_id": "869879", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879" }, { "reference_url": "https://security.gentoo.org/glsa/201811-12", "reference_id": "GLSA-201811-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-12" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-9740" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmkv-up69-u7c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51904?format=api", "vulnerability_id": "VCID-msc6-ev6c-1bcn", "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n worst of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9726.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9726.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9726", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56072", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56233", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56202", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56239", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56249", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56225", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56182", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79689", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.7966", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9726" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475830", "reference_id": "1475830", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475830" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869915", "reference_id": "869915", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869915" }, { "reference_url": "https://security.gentoo.org/glsa/201811-12", "reference_id": "GLSA-201811-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-12" }, { "reference_url": "https://usn.ubuntu.com/3403-1/", "reference_id": "USN-3403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-9726" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-msc6-ev6c-1bcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51898?format=api", "vulnerability_id": "VCID-njhw-89wt-23b1", "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n worst of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9612.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9612.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9612", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53407", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53426", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53478", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53475", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53524", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53507", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53431", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53457", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.7966", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79689", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475826", "reference_id": "1475826", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475826" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869916", "reference_id": "869916", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869916" }, { "reference_url": "https://security.gentoo.org/glsa/201811-12", "reference_id": "GLSA-201811-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-12" }, { "reference_url": "https://usn.ubuntu.com/3403-1/", "reference_id": "USN-3403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-9612" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-njhw-89wt-23b1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51906?format=api", "vulnerability_id": "VCID-p4e6-xwff-vuax", "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n worst of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9739.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9739.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9739", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56072", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56233", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56202", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56239", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56249", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56225", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56182", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79689", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.7966", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475834", "reference_id": "1475834", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475834" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869910", "reference_id": "869910", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869910" }, { "reference_url": "https://security.gentoo.org/glsa/201811-12", "reference_id": "GLSA-201811-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-12" }, { "reference_url": "https://usn.ubuntu.com/3403-1/", "reference_id": "USN-3403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-9739" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p4e6-xwff-vuax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84398?format=api", "vulnerability_id": "VCID-sc3j-2vy3-j3e1", "summary": "ghostscript: Out-of-bounds read in mark_line_tr function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8908.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8908.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8908", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60027", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60191", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.6017", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60152", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60105", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60129", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60148", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60162", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60184", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8908" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8908", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8908" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1451247", "reference_id": "1451247", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1451247" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-8908" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sc3j-2vy3-j3e1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51902?format=api", "vulnerability_id": "VCID-szch-k4pu-wubc", "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n worst of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9619.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9619.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9619", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70089", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70104", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70081", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70128", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70145", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70153", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.7014", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70184", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9619" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475828", "reference_id": "1475828", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475828" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879", "reference_id": "869879", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879" }, { "reference_url": "https://security.gentoo.org/glsa/201811-12", "reference_id": "GLSA-201811-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-12" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-9619" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-szch-k4pu-wubc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51895?format=api", "vulnerability_id": "VCID-tug2-npfa-nkaj", "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n worst of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "http://git.ghostscript.com/?p=ghostpdl.git%3Bh=8210a2864372723b49c526e2b102fdc00c9c4699", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.ghostscript.com/?p=ghostpdl.git%3Bh=8210a2864372723b49c526e2b102fdc00c9c4699" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7948.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7948.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7948", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.4525", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45393", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45372", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.4534", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45342", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45331", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45352", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45295", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.4535", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7948" }, { "reference_url": "https://bugs.ghostscript.com/show_bug.cgi?id=697762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.ghostscript.com/show_bug.cgi?id=697762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7948", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7948" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444944", "reference_id": "1444944", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444944" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7948", "reference_id": "CVE-2017-7948", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7948" }, { "reference_url": "https://security.gentoo.org/glsa/201811-12", "reference_id": "GLSA-201811-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-12" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7948" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tug2-npfa-nkaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51905?format=api", "vulnerability_id": "VCID-wtcr-fwz7-j7bk", "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n worst of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9727.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9727.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9727", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56072", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56233", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56202", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56239", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56249", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56225", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00334", "scoring_system": "epss", "scoring_elements": "0.56182", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.79689", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0129", "scoring_system": "epss", "scoring_elements": "0.7966", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475833", "reference_id": "1475833", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475833" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869913", "reference_id": "869913", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869913" }, { "reference_url": "https://security.gentoo.org/glsa/201811-12", "reference_id": "GLSA-201811-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-12" }, { "reference_url": "https://usn.ubuntu.com/3403-1/", "reference_id": "USN-3403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-9727" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wtcr-fwz7-j7bk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51896?format=api", "vulnerability_id": "VCID-zw1d-wcpb-rfbp", "summary": "Multiple vulnerabilities have been found in GPL Ghostscript, the\n worst of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9610.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9610.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9610", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61024", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61101", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61129", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61144", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61159", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61179", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61166", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61147", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61187", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9610" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9610", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9610" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475824", "reference_id": "1475824", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475824" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879", "reference_id": "869879", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879" }, { "reference_url": "https://security.gentoo.org/glsa/201811-12", "reference_id": "GLSA-201811-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-12" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/923060?format=api", "purl": "pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923039?format=api", "purl": "pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-j6nh-rfbg-z7f7" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923037?format=api", "purl": "pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1nh4-crmx-jfb5" }, { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-rdmp-hfbg-2kh5" }, { "vulnerability": "VCID-t3n4-wrgr-bkdy" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923041?format=api", "purl": "pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k837-n44h-pkbm" }, { "vulnerability": "VCID-wzad-uxqp-63h3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/923040?format=api", "purl": "pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-9610" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zw1d-wcpb-rfbp" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie" }