Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie
Typedeb
Namespacedebian
Nameghostscript
Version10.0.0~dfsg-11+deb12u6
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version10.0.0~dfsg-11+deb12u7
Latest_non_vulnerable_version10.07.0~dfsg-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-7u9a-5pkt-4fbf
vulnerability_id VCID-7u9a-5pkt-4fbf
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46956.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46956.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-46956
reference_id
reference_type
scores
0
value 0.00327
scoring_system epss
scoring_elements 0.55675
published_at 2026-04-16T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.55608
published_at 2026-04-02T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.55634
published_at 2026-04-04T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.5561
published_at 2026-04-07T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55662
published_at 2026-04-08T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55665
published_at 2026-04-09T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.55674
published_at 2026-04-11T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55654
published_at 2026-04-12T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55637
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-46956
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46956
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325047
reference_id 2325047
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325047
5
reference_url https://security.gentoo.org/glsa/202501-06
reference_id GLSA-202501-06
reference_type
scores
url https://security.gentoo.org/glsa/202501-06
6
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca
reference_id ?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca
7
reference_url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
reference_id News.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/
url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
8
reference_url https://access.redhat.com/errata/RHSA-2025:4362
reference_id RHSA-2025:4362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4362
9
reference_url https://access.redhat.com/errata/RHSA-2025:7422
reference_id RHSA-2025:7422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7422
10
reference_url https://access.redhat.com/errata/RHSA-2025:7499
reference_id RHSA-2025:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7499
11
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707895
reference_id show_bug.cgi?id=707895
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707895
12
reference_url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
reference_id suse-su-20243942-1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/
url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
13
reference_url https://usn.ubuntu.com/7103-1/
reference_id USN-7103-1
reference_type
scores
url https://usn.ubuntu.com/7103-1/
14
reference_url https://usn.ubuntu.com/7138-1/
reference_id USN-7138-1
reference_type
scores
url https://usn.ubuntu.com/7138-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u9?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u9%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2024-46956
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7u9a-5pkt-4fbf
1
url VCID-9q8n-jfqs-bkg6
vulnerability_id VCID-9q8n-jfqs-bkg6
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46952.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-46952
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21684
published_at 2026-04-16T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21829
published_at 2026-04-02T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21882
published_at 2026-04-04T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21634
published_at 2026-04-07T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21711
published_at 2026-04-08T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21768
published_at 2026-04-09T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21781
published_at 2026-04-11T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21741
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-46952
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325041
reference_id 2325041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325041
4
reference_url https://security.gentoo.org/glsa/202501-06
reference_id GLSA-202501-06
reference_type
scores
url https://security.gentoo.org/glsa/202501-06
5
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b1f0827c30f59a2dcbc8a39e42cace7a1de35f7f
reference_id ?id=b1f0827c30f59a2dcbc8a39e42cace7a1de35f7f
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:27:55Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b1f0827c30f59a2dcbc8a39e42cace7a1de35f7f
6
reference_url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
reference_id News.html
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:27:55Z/
url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:4362
reference_id RHSA-2025:4362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4362
8
reference_url https://access.redhat.com/errata/RHSA-2025:7422
reference_id RHSA-2025:7422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7422
9
reference_url https://access.redhat.com/errata/RHSA-2025:7499
reference_id RHSA-2025:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7499
10
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=708001
reference_id show_bug.cgi?id=708001
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:27:55Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=708001
11
reference_url https://usn.ubuntu.com/7103-1/
reference_id USN-7103-1
reference_type
scores
url https://usn.ubuntu.com/7103-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@0?distro=trixie
purl pkg:deb/debian/ghostscript@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2024-46952
risk_score 3.8
exploitability 0.5
weighted_severity 7.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9q8n-jfqs-bkg6
2
url VCID-barv-t623-h3e5
vulnerability_id VCID-barv-t623-h3e5
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46951.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46951.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-46951
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33956
published_at 2026-04-16T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.34027
published_at 2026-04-02T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.34057
published_at 2026-04-04T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33912
published_at 2026-04-07T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33955
published_at 2026-04-08T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33987
published_at 2026-04-09T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33985
published_at 2026-04-11T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33942
published_at 2026-04-12T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33919
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-46951
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46951
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325043
reference_id 2325043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325043
5
reference_url https://security.gentoo.org/glsa/202501-06
reference_id GLSA-202501-06
reference_type
scores
url https://security.gentoo.org/glsa/202501-06
6
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f49812186baa7d1362880673408a6fbe8719b4f8
reference_id ?id=f49812186baa7d1362880673408a6fbe8719b4f8
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f49812186baa7d1362880673408a6fbe8719b4f8
7
reference_url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
reference_id News.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/
url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
8
reference_url https://access.redhat.com/errata/RHSA-2025:4362
reference_id RHSA-2025:4362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4362
9
reference_url https://access.redhat.com/errata/RHSA-2025:7422
reference_id RHSA-2025:7422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7422
10
reference_url https://access.redhat.com/errata/RHSA-2025:7499
reference_id RHSA-2025:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7499
11
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707991
reference_id show_bug.cgi?id=707991
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707991
12
reference_url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
reference_id suse-su-20243942-1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/
url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
13
reference_url https://usn.ubuntu.com/7103-1/
reference_id USN-7103-1
reference_type
scores
url https://usn.ubuntu.com/7103-1/
14
reference_url https://usn.ubuntu.com/7138-1/
reference_id USN-7138-1
reference_type
scores
url https://usn.ubuntu.com/7138-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u9?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u9%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2024-46951
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-barv-t623-h3e5
3
url VCID-eypv-n5ea-abgn
vulnerability_id VCID-eypv-n5ea-abgn
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46953.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46953.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-46953
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30624
published_at 2026-04-16T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30728
published_at 2026-04-02T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30776
published_at 2026-04-04T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30592
published_at 2026-04-07T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30651
published_at 2026-04-08T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30684
published_at 2026-04-09T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30688
published_at 2026-04-11T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30644
published_at 2026-04-12T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30598
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-46953
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46953
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325045
reference_id 2325045
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325045
5
reference_url https://security.gentoo.org/glsa/202501-06
reference_id GLSA-202501-06
reference_type
scores
url https://security.gentoo.org/glsa/202501-06
6
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=1f21a45df0fa3abec4cff12951022b192dda3c00
reference_id ?id=1f21a45df0fa3abec4cff12951022b192dda3c00
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=1f21a45df0fa3abec4cff12951022b192dda3c00
7
reference_url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
reference_id News.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/
url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
8
reference_url https://access.redhat.com/errata/RHSA-2025:4362
reference_id RHSA-2025:4362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4362
9
reference_url https://access.redhat.com/errata/RHSA-2025:7422
reference_id RHSA-2025:7422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7422
10
reference_url https://access.redhat.com/errata/RHSA-2025:7499
reference_id RHSA-2025:7499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7499
11
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707793
reference_id show_bug.cgi?id=707793
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707793
12
reference_url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
reference_id suse-su-20243942-1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/
url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
13
reference_url https://usn.ubuntu.com/7103-1/
reference_id USN-7103-1
reference_type
scores
url https://usn.ubuntu.com/7103-1/
14
reference_url https://usn.ubuntu.com/7138-1/
reference_id USN-7138-1
reference_type
scores
url https://usn.ubuntu.com/7138-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u9?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u9%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2024-46953
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eypv-n5ea-abgn
4
url VCID-k2rj-x3d7-ryd2
vulnerability_id VCID-k2rj-x3d7-ryd2
summary Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46955.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46955.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-46955
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14515
published_at 2026-04-16T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14728
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14803
published_at 2026-04-04T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14608
published_at 2026-04-07T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14697
published_at 2026-04-08T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14756
published_at 2026-04-09T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14717
published_at 2026-04-11T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14678
published_at 2026-04-12T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14624
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-46955
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46955
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325042
reference_id 2325042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325042
5
reference_url https://security.gentoo.org/glsa/202501-06
reference_id GLSA-202501-06
reference_type
scores
url https://security.gentoo.org/glsa/202501-06
6
reference_url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=85bd9d2f4b792fe67aef22f1a4117457461b8ba6
reference_id ?id=85bd9d2f4b792fe67aef22f1a4117457461b8ba6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/
url https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=85bd9d2f4b792fe67aef22f1a4117457461b8ba6
7
reference_url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
reference_id News.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/
url https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html
8
reference_url https://bugs.ghostscript.com/show_bug.cgi?id=707990
reference_id show_bug.cgi?id=707990
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/
url https://bugs.ghostscript.com/show_bug.cgi?id=707990
9
reference_url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
reference_id suse-su-20243942-1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/
url https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/
10
reference_url https://usn.ubuntu.com/7103-1/
reference_id USN-7103-1
reference_type
scores
url https://usn.ubuntu.com/7103-1/
11
reference_url https://usn.ubuntu.com/7138-1/
reference_id USN-7138-1
reference_type
scores
url https://usn.ubuntu.com/7138-1/
fixed_packages
0
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u9?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u9%3Fdistro=trixie
2
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
aliases CVE-2024-46955
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2rj-x3d7-ryd2
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u6%3Fdistro=trixie