Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
Typedeb
Namespacedebian
Namehplip
Version3.22.10+dfsg0-2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.22.10+dfsg0-8.1
Latest_non_vulnerable_version3.22.10+dfsg0-8.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-8e1n-19ca-ayb4
vulnerability_id VCID-8e1n-19ca-ayb4
summary
A vulnerability in foomatic-filters could result in the execution
    of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2697.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2697.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2697
reference_id
reference_type
scores
0
value 0.05428
scoring_system epss
scoring_elements 0.90122
published_at 2026-04-01T12:55:00Z
1
value 0.05428
scoring_system epss
scoring_elements 0.90124
published_at 2026-04-02T12:55:00Z
2
value 0.05428
scoring_system epss
scoring_elements 0.90136
published_at 2026-04-04T12:55:00Z
3
value 0.05428
scoring_system epss
scoring_elements 0.90141
published_at 2026-04-07T12:55:00Z
4
value 0.05428
scoring_system epss
scoring_elements 0.90157
published_at 2026-04-08T12:55:00Z
5
value 0.05428
scoring_system epss
scoring_elements 0.90163
published_at 2026-04-09T12:55:00Z
6
value 0.05428
scoring_system epss
scoring_elements 0.90171
published_at 2026-04-11T12:55:00Z
7
value 0.05428
scoring_system epss
scoring_elements 0.9017
published_at 2026-04-12T12:55:00Z
8
value 0.05428
scoring_system epss
scoring_elements 0.90165
published_at 2026-04-13T12:55:00Z
9
value 0.05428
scoring_system epss
scoring_elements 0.90183
published_at 2026-04-16T12:55:00Z
10
value 0.05428
scoring_system epss
scoring_elements 0.90182
published_at 2026-04-18T12:55:00Z
11
value 0.05428
scoring_system epss
scoring_elements 0.90179
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2697
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635549
reference_id 635549
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635549
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=721001
reference_id 721001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=721001
5
reference_url https://security.gentoo.org/glsa/201203-07
reference_id GLSA-201203-07
reference_type
scores
url https://security.gentoo.org/glsa/201203-07
6
reference_url https://access.redhat.com/errata/RHSA-2011:1109
reference_id RHSA-2011:1109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1109
7
reference_url https://usn.ubuntu.com/1194-1/
reference_id USN-1194-1
reference_type
scores
url https://usn.ubuntu.com/1194-1/
fixed_packages
0
url pkg:deb/debian/hplip@3.10.6-2?distro=trixie
purl pkg:deb/debian/hplip@3.10.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.10.6-2%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2011-2697
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8e1n-19ca-ayb4
1
url VCID-a7h1-7a1g-vqa6
vulnerability_id VCID-a7h1-7a1g-vqa6
summary hplip hpssd.py Denial-Of-Service parsing vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2941.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2941.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2941
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10522
published_at 2026-04-21T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10383
published_at 2026-04-01T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10494
published_at 2026-04-02T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10564
published_at 2026-04-04T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10428
published_at 2026-04-07T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10502
published_at 2026-04-08T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10568
published_at 2026-04-09T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10598
published_at 2026-04-11T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10565
published_at 2026-04-12T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10542
published_at 2026-04-13T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10409
published_at 2026-04-16T12:55:00Z
11
value 0.00036
scoring_system epss
scoring_elements 0.10392
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2941
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2941
4
reference_url http://secunia.com/advisories/31470
reference_id
reference_type
scores
url http://secunia.com/advisories/31470
5
reference_url http://secunia.com/advisories/31499
reference_id
reference_type
scores
url http://secunia.com/advisories/31499
6
reference_url http://secunia.com/advisories/32316
reference_id
reference_type
scores
url http://secunia.com/advisories/32316
7
reference_url http://secunia.com/advisories/32792
reference_id
reference_type
scores
url http://secunia.com/advisories/32792
8
reference_url http://securitytracker.com/id?1020683
reference_id
reference_type
scores
url http://securitytracker.com/id?1020683
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44440
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44440
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10636
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10636
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:169
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:169
12
reference_url http://www.redhat.com/support/errata/RHSA-2008-0818.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0818.html
13
reference_url http://www.securityfocus.com/bid/30683
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30683
14
reference_url http://www.ubuntu.com/usn/USN-674-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-674-1
15
reference_url http://www.ubuntu.com/usn/USN-674-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-674-2
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=457052
reference_id 457052
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=457052
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499842
reference_id 499842
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499842
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2941
reference_id CVE-2008-2941
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-2941
20
reference_url https://access.redhat.com/errata/RHSA-2008:0818
reference_id RHSA-2008:0818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0818
21
reference_url https://usn.ubuntu.com/674-1/
reference_id USN-674-1
reference_type
scores
url https://usn.ubuntu.com/674-1/
22
reference_url https://usn.ubuntu.com/674-2/
reference_id USN-674-2
reference_type
scores
url https://usn.ubuntu.com/674-2/
fixed_packages
0
url pkg:deb/debian/hplip@2.8.6-1?distro=trixie
purl pkg:deb/debian/hplip@2.8.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@2.8.6-1%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2008-2941
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a7h1-7a1g-vqa6
2
url VCID-ajy8-wz5n-mfb2
vulnerability_id VCID-ajy8-wz5n-mfb2
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6402.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6402
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.1814
published_at 2026-04-01T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18296
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.1835
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18052
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18135
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.1819
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18195
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18148
published_at 2026-04-12T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18097
published_at 2026-04-13T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18039
published_at 2026-04-16T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18051
published_at 2026-04-18T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18085
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6402
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1035243
reference_id 1035243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1035243
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725876
reference_id 725876
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725876
8
reference_url https://usn.ubuntu.com/2085-1/
reference_id USN-2085-1
reference_type
scores
url https://usn.ubuntu.com/2085-1/
fixed_packages
0
url pkg:deb/debian/hplip@3.13.11-2.1?distro=trixie
purl pkg:deb/debian/hplip@3.13.11-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.13.11-2.1%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2013-6402
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ajy8-wz5n-mfb2
3
url VCID-cnxw-4ree-g3ez
vulnerability_id VCID-cnxw-4ree-g3ez
summary
The hpssd daemon might allow local attackers to execute arbitrary commands
    with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5208.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5208
reference_id
reference_type
scores
0
value 0.73689
scoring_system epss
scoring_elements 0.98802
published_at 2026-04-02T12:55:00Z
1
value 0.73689
scoring_system epss
scoring_elements 0.98805
published_at 2026-04-04T12:55:00Z
2
value 0.73689
scoring_system epss
scoring_elements 0.98809
published_at 2026-04-09T12:55:00Z
3
value 0.73689
scoring_system epss
scoring_elements 0.9881
published_at 2026-04-08T12:55:00Z
4
value 0.73689
scoring_system epss
scoring_elements 0.98812
published_at 2026-04-11T12:55:00Z
5
value 0.73689
scoring_system epss
scoring_elements 0.98813
published_at 2026-04-12T12:55:00Z
6
value 0.73689
scoring_system epss
scoring_elements 0.98814
published_at 2026-04-13T12:55:00Z
7
value 0.73689
scoring_system epss
scoring_elements 0.98818
published_at 2026-04-16T12:55:00Z
8
value 0.73689
scoring_system epss
scoring_elements 0.98819
published_at 2026-04-18T12:55:00Z
9
value 0.73689
scoring_system epss
scoring_elements 0.98822
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=319921
reference_id 319921
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=319921
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447341
reference_id 447341
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447341
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16837.rb
reference_id CVE-2007-5208;OSVDB-41693
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16837.rb
6
reference_url https://security.gentoo.org/glsa/200710-26
reference_id GLSA-200710-26
reference_type
scores
url https://security.gentoo.org/glsa/200710-26
7
reference_url https://access.redhat.com/errata/RHSA-2007:0960
reference_id RHSA-2007:0960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0960
8
reference_url https://usn.ubuntu.com/530-1/
reference_id USN-530-1
reference_type
scores
url https://usn.ubuntu.com/530-1/
fixed_packages
0
url pkg:deb/debian/hplip@1.6.10-4.3?distro=trixie
purl pkg:deb/debian/hplip@1.6.10-4.3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@1.6.10-4.3%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2007-5208
risk_score 1.4
exploitability 2.0
weighted_severity 0.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cnxw-4ree-g3ez
4
url VCID-e7ce-ncn2-87dd
vulnerability_id VCID-e7ce-ncn2-87dd
summary
A race condition in polkit could allow a local attacker to gain
    escalated privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4325.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4325.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4325
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20143
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20291
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20348
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20072
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20153
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20211
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20236
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.2019
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20132
published_at 2026-04-13T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20124
published_at 2026-04-16T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20129
published_at 2026-04-18T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20128
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4325
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1006674
reference_id 1006674
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1006674
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723716
reference_id 723716
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723716
8
reference_url https://security.gentoo.org/glsa/201406-27
reference_id GLSA-201406-27
reference_type
scores
url https://security.gentoo.org/glsa/201406-27
9
reference_url https://access.redhat.com/errata/RHSA-2013:1274
reference_id RHSA-2013:1274
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1274
10
reference_url https://usn.ubuntu.com/1956-1/
reference_id USN-1956-1
reference_type
scores
url https://usn.ubuntu.com/1956-1/
fixed_packages
0
url pkg:deb/debian/hplip@3.13.9-1?distro=trixie
purl pkg:deb/debian/hplip@3.13.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.13.9-1%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2013-4325
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7ce-ncn2-87dd
5
url VCID-f2yg-yaaj-uub1
vulnerability_id VCID-f2yg-yaaj-uub1
summary
Multiple vulnerabilities have been found in HPLIP, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2722.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2722
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21346
published_at 2026-04-01T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21513
published_at 2026-04-02T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21572
published_at 2026-04-04T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21327
published_at 2026-04-07T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21405
published_at 2026-04-08T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21467
published_at 2026-04-09T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21478
published_at 2026-04-11T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21439
published_at 2026-04-12T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21383
published_at 2026-04-13T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21378
published_at 2026-04-16T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21386
published_at 2026-04-18T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21354
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2722
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2722
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635549
reference_id 635549
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635549
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=725830
reference_id 725830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=725830
5
reference_url https://security.gentoo.org/glsa/201203-17
reference_id GLSA-201203-17
reference_type
scores
url https://security.gentoo.org/glsa/201203-17
6
reference_url https://access.redhat.com/errata/RHSA-2013:0133
reference_id RHSA-2013:0133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0133
7
reference_url https://access.redhat.com/errata/RHSA-2013:0500
reference_id RHSA-2013:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0500
8
reference_url https://usn.ubuntu.com/1981-1/
reference_id USN-1981-1
reference_type
scores
url https://usn.ubuntu.com/1981-1/
fixed_packages
0
url pkg:deb/debian/hplip@3.11.10-1?distro=trixie
purl pkg:deb/debian/hplip@3.11.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.11.10-1%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2011-2722
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f2yg-yaaj-uub1
6
url VCID-f39n-wae1-n3cc
vulnerability_id VCID-f39n-wae1-n3cc
summary hplip: hp-plugin verified binary download with short key ID
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0839.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0839
reference_id
reference_type
scores
0
value 0.00269
scoring_system epss
scoring_elements 0.50444
published_at 2026-04-21T12:55:00Z
1
value 0.00269
scoring_system epss
scoring_elements 0.5042
published_at 2026-04-13T12:55:00Z
2
value 0.00269
scoring_system epss
scoring_elements 0.50463
published_at 2026-04-16T12:55:00Z
3
value 0.00269
scoring_system epss
scoring_elements 0.50468
published_at 2026-04-18T12:55:00Z
4
value 0.00269
scoring_system epss
scoring_elements 0.5037
published_at 2026-04-07T12:55:00Z
5
value 0.00269
scoring_system epss
scoring_elements 0.50424
published_at 2026-04-08T12:55:00Z
6
value 0.00269
scoring_system epss
scoring_elements 0.50417
published_at 2026-04-09T12:55:00Z
7
value 0.00269
scoring_system epss
scoring_elements 0.50458
published_at 2026-04-11T12:55:00Z
8
value 0.00269
scoring_system epss
scoring_elements 0.50435
published_at 2026-04-12T12:55:00Z
9
value 0.00496
scoring_system epss
scoring_elements 0.65788
published_at 2026-04-02T12:55:00Z
10
value 0.00496
scoring_system epss
scoring_elements 0.65818
published_at 2026-04-04T12:55:00Z
11
value 0.00496
scoring_system epss
scoring_elements 0.65739
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0839
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0839
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1227252
reference_id 1227252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1227252
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787353
reference_id 787353
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787353
5
reference_url https://usn.ubuntu.com/2699-1/
reference_id USN-2699-1
reference_type
scores
url https://usn.ubuntu.com/2699-1/
fixed_packages
0
url pkg:deb/debian/hplip@3.15.11%2Brepack0-1?distro=trixie
purl pkg:deb/debian/hplip@3.15.11%2Brepack0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.15.11%252Brepack0-1%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2015-0839
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f39n-wae1-n3cc
7
url VCID-f3w3-w65v-hyhm
vulnerability_id VCID-f3w3-w65v-hyhm
summary hpssd of hplip allows unprivileged user to trigger alert mail
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2940.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2940.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2940
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13414
published_at 2026-04-21T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13449
published_at 2026-04-01T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13548
published_at 2026-04-02T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13611
published_at 2026-04-04T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13407
published_at 2026-04-07T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13488
published_at 2026-04-08T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13537
published_at 2026-04-09T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.1351
published_at 2026-04-11T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13473
published_at 2026-04-12T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13427
published_at 2026-04-13T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13333
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2940
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2940
4
reference_url http://secunia.com/advisories/31470
reference_id
reference_type
scores
url http://secunia.com/advisories/31470
5
reference_url http://secunia.com/advisories/31499
reference_id
reference_type
scores
url http://secunia.com/advisories/31499
6
reference_url http://secunia.com/advisories/32316
reference_id
reference_type
scores
url http://secunia.com/advisories/32316
7
reference_url http://secunia.com/advisories/32792
reference_id
reference_type
scores
url http://secunia.com/advisories/32792
8
reference_url http://securitytracker.com/id?1020684
reference_id
reference_type
scores
url http://securitytracker.com/id?1020684
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44441
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44441
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10136
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10136
11
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:169
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:169
12
reference_url http://www.redhat.com/support/errata/RHSA-2008-0818.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0818.html
13
reference_url http://www.securityfocus.com/bid/30683
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30683
14
reference_url http://www.ubuntu.com/usn/USN-674-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-674-1
15
reference_url http://www.ubuntu.com/usn/USN-674-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-674-2
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=455235
reference_id 455235
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=455235
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499842
reference_id 499842
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499842
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2940
reference_id CVE-2008-2940
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-2940
20
reference_url https://access.redhat.com/errata/RHSA-2008:0818
reference_id RHSA-2008:0818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0818
21
reference_url https://usn.ubuntu.com/674-1/
reference_id USN-674-1
reference_type
scores
url https://usn.ubuntu.com/674-1/
22
reference_url https://usn.ubuntu.com/674-2/
reference_id USN-674-2
reference_type
scores
url https://usn.ubuntu.com/674-2/
fixed_packages
0
url pkg:deb/debian/hplip@2.8.6-1?distro=trixie
purl pkg:deb/debian/hplip@2.8.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@2.8.6-1%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2008-2940
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f3w3-w65v-hyhm
8
url VCID-fkwk-st8h-sqav
vulnerability_id VCID-fkwk-st8h-sqav
summary hplip: default permissions for /var/log/hp are too open
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6108.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6108.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6108
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17944
published_at 2026-04-01T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.18104
published_at 2026-04-02T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.18157
published_at 2026-04-04T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17857
published_at 2026-04-07T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17945
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.18006
published_at 2026-04-09T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.18022
published_at 2026-04-11T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17977
published_at 2026-04-12T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17928
published_at 2026-04-13T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17871
published_at 2026-04-16T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17881
published_at 2026-04-18T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17918
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6108
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=894283
reference_id 894283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=894283
fixed_packages
0
url pkg:deb/debian/hplip@0?distro=trixie
purl pkg:deb/debian/hplip@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@0%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2012-6108
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fkwk-st8h-sqav
9
url VCID-k8hw-71wj-dygy
vulnerability_id VCID-k8hw-71wj-dygy
summary The HP Linux Imaging and Printing (HPLIP) software may potentially be affected by memory buffer overflow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6923
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18078
published_at 2026-04-21T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18032
published_at 2026-04-16T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18044
published_at 2026-04-18T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18129
published_at 2026-04-01T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18286
published_at 2026-04-02T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18337
published_at 2026-04-04T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.1804
published_at 2026-04-07T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18123
published_at 2026-04-08T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18179
published_at 2026-04-09T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18186
published_at 2026-04-11T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18138
published_at 2026-04-12T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18089
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6923
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6923
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://support.hp.com/us-en/document/c06927115
reference_id c06927115
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-20T16:45:04Z/
url https://support.hp.com/us-en/document/c06927115
4
reference_url https://usn.ubuntu.com/7202-1/
reference_id USN-7202-1
reference_type
scores
url https://usn.ubuntu.com/7202-1/
fixed_packages
0
url pkg:deb/debian/hplip@3.20.9%2Bdfsg0-3?distro=trixie
purl pkg:deb/debian/hplip@3.20.9%2Bdfsg0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.20.9%252Bdfsg0-3%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2020-6923
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8hw-71wj-dygy
10
url VCID-m5z3-fsqw-nue1
vulnerability_id VCID-m5z3-fsqw-nue1
summary several
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6427.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6427
reference_id
reference_type
scores
0
value 0.0078
scoring_system epss
scoring_elements 0.73636
published_at 2026-04-01T12:55:00Z
1
value 0.0078
scoring_system epss
scoring_elements 0.73645
published_at 2026-04-02T12:55:00Z
2
value 0.0078
scoring_system epss
scoring_elements 0.73669
published_at 2026-04-04T12:55:00Z
3
value 0.0078
scoring_system epss
scoring_elements 0.73642
published_at 2026-04-07T12:55:00Z
4
value 0.0078
scoring_system epss
scoring_elements 0.73677
published_at 2026-04-08T12:55:00Z
5
value 0.0078
scoring_system epss
scoring_elements 0.7369
published_at 2026-04-09T12:55:00Z
6
value 0.0078
scoring_system epss
scoring_elements 0.73711
published_at 2026-04-11T12:55:00Z
7
value 0.0078
scoring_system epss
scoring_elements 0.73694
published_at 2026-04-12T12:55:00Z
8
value 0.0078
scoring_system epss
scoring_elements 0.73685
published_at 2026-04-13T12:55:00Z
9
value 0.0078
scoring_system epss
scoring_elements 0.73728
published_at 2026-04-21T12:55:00Z
10
value 0.0078
scoring_system epss
scoring_elements 0.73737
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1038434
reference_id 1038434
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1038434
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731480
reference_id 731480
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731480
8
reference_url https://usn.ubuntu.com/2085-1/
reference_id USN-2085-1
reference_type
scores
url https://usn.ubuntu.com/2085-1/
fixed_packages
0
url pkg:deb/debian/hplip@3.13.11-2?distro=trixie
purl pkg:deb/debian/hplip@3.13.11-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.13.11-2%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2013-6427
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m5z3-fsqw-nue1
11
url VCID-mfqk-y4g4-sfa5
vulnerability_id VCID-mfqk-y4g4-sfa5
summary
Multiple vulnerabilities have been found in HPLIP, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053472.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053472.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053474.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053474.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
4
reference_url http://osvdb.org/70498
reference_id
reference_type
scores
url http://osvdb.org/70498
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4267.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4267.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4267
reference_id
reference_type
scores
0
value 0.10217
scoring_system epss
scoring_elements 0.93167
published_at 2026-04-21T12:55:00Z
1
value 0.10217
scoring_system epss
scoring_elements 0.9311
published_at 2026-04-01T12:55:00Z
2
value 0.10217
scoring_system epss
scoring_elements 0.93119
published_at 2026-04-02T12:55:00Z
3
value 0.10217
scoring_system epss
scoring_elements 0.93123
published_at 2026-04-04T12:55:00Z
4
value 0.10217
scoring_system epss
scoring_elements 0.93122
published_at 2026-04-07T12:55:00Z
5
value 0.10217
scoring_system epss
scoring_elements 0.9313
published_at 2026-04-08T12:55:00Z
6
value 0.10217
scoring_system epss
scoring_elements 0.93135
published_at 2026-04-09T12:55:00Z
7
value 0.10217
scoring_system epss
scoring_elements 0.9314
published_at 2026-04-11T12:55:00Z
8
value 0.10217
scoring_system epss
scoring_elements 0.93137
published_at 2026-04-12T12:55:00Z
9
value 0.10217
scoring_system epss
scoring_elements 0.93139
published_at 2026-04-13T12:55:00Z
10
value 0.10217
scoring_system epss
scoring_elements 0.93155
published_at 2026-04-16T12:55:00Z
11
value 0.10217
scoring_system epss
scoring_elements 0.9316
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4267
7
reference_url https://bugzilla.redhat.com/attachment.cgi?id=468455&action=diff
reference_id
reference_type
scores
url https://bugzilla.redhat.com/attachment.cgi?id=468455&action=diff
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267
9
reference_url http://secunia.com/advisories/42939
reference_id
reference_type
scores
url http://secunia.com/advisories/42939
10
reference_url http://secunia.com/advisories/42956
reference_id
reference_type
scores
url http://secunia.com/advisories/42956
11
reference_url http://secunia.com/advisories/43022
reference_id
reference_type
scores
url http://secunia.com/advisories/43022
12
reference_url http://secunia.com/advisories/43068
reference_id
reference_type
scores
url http://secunia.com/advisories/43068
13
reference_url http://secunia.com/advisories/43083
reference_id
reference_type
scores
url http://secunia.com/advisories/43083
14
reference_url http://secunia.com/advisories/43102
reference_id
reference_type
scores
url http://secunia.com/advisories/43102
15
reference_url http://secunia.com/advisories/48441
reference_id
reference_type
scores
url http://secunia.com/advisories/48441
16
reference_url http://security.gentoo.org/glsa/glsa-201203-17.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201203-17.xml
17
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64738
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64738
18
reference_url http://www.debian.org/security/2011/dsa-2152
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2152
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:013
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:013
20
reference_url http://www.redhat.com/support/errata/RHSA-2011-0154.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0154.html
21
reference_url http://www.securityfocus.com/bid/45833
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45833
22
reference_url http://www.securitytracker.com/id?1024967
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024967
23
reference_url http://www.ubuntu.com/usn/USN-1051-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1051-1
24
reference_url http://www.vupen.com/english/advisories/2011/0136
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0136
25
reference_url http://www.vupen.com/english/advisories/2011/0160
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0160
26
reference_url http://www.vupen.com/english/advisories/2011/0211
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0211
27
reference_url http://www.vupen.com/english/advisories/2011/0212
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0212
28
reference_url http://www.vupen.com/english/advisories/2011/0228
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0228
29
reference_url http://www.vupen.com/english/advisories/2011/0243
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0243
30
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610960
reference_id 610960
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610960
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=662740
reference_id 662740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=662740
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4267
reference_id CVE-2010-4267
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4267
36
reference_url https://security.gentoo.org/glsa/201203-17
reference_id GLSA-201203-17
reference_type
scores
url https://security.gentoo.org/glsa/201203-17
37
reference_url https://access.redhat.com/errata/RHSA-2011:0154
reference_id RHSA-2011:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0154
38
reference_url https://usn.ubuntu.com/1051-1/
reference_id USN-1051-1
reference_type
scores
url https://usn.ubuntu.com/1051-1/
fixed_packages
0
url pkg:deb/debian/hplip@3.10.6-2?distro=trixie
purl pkg:deb/debian/hplip@3.10.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.10.6-2%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2010-4267
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfqk-y4g4-sfa5
12
url VCID-rk37-f487-q7g9
vulnerability_id VCID-rk37-f487-q7g9
summary hplip.postinst in HP Linux Imaging and Printing (HPLIP) 2.7.7 and 2.8.2 on Ubuntu allows local users to change the ownership of arbitrary files via unspecified manipulations in advance of an HPLIP installation or upgrade by an administrator, related to the product's attempt to correct the ownership of its configuration files within home directories.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0122.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0122
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16561
published_at 2026-04-21T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16531
published_at 2026-04-01T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16713
published_at 2026-04-02T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16775
published_at 2026-04-04T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16565
published_at 2026-04-07T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.1665
published_at 2026-04-08T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16703
published_at 2026-04-09T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16681
published_at 2026-04-11T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.1664
published_at 2026-04-12T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.1658
published_at 2026-04-13T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16516
published_at 2026-04-16T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16524
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0122
2
reference_url http://secunia.com/advisories/33539
reference_id
reference_type
scores
url http://secunia.com/advisories/33539
3
reference_url https://launchpad.net/bugs/191299
reference_id
reference_type
scores
url https://launchpad.net/bugs/191299
4
reference_url http://www.securityfocus.com/bid/33249
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33249
5
reference_url http://www.ubuntu.com/usn/usn-708-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-708-1
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:hplip:2.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:hplip:2.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:hplip:2.7.7:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:hplip:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:hplip:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:hplip:2.8.2:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0122
reference_id CVE-2009-0122
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2009-0122
9
reference_url https://usn.ubuntu.com/708-1/
reference_id USN-708-1
reference_type
scores
url https://usn.ubuntu.com/708-1/
fixed_packages
0
url pkg:deb/debian/hplip@0?distro=trixie
purl pkg:deb/debian/hplip@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@0%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2009-0122
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rk37-f487-q7g9
13
url VCID-y2pa-cbhj-r7az
vulnerability_id VCID-y2pa-cbhj-r7az
summary several
references
0
reference_url ftp://ftp.scientificlinux.org/linux/scientific/6x/SRPMS/vendor/hplip-3.12.4-4.el6.src.rpm
reference_id
reference_type
scores
url ftp://ftp.scientificlinux.org/linux/scientific/6x/SRPMS/vendor/hplip-3.12.4-4.el6.src.rpm
1
reference_url http://hplipopensource.com/hplip-web/release_notes.html
reference_id
reference_type
scores
url http://hplipopensource.com/hplip-web/release_notes.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0200.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0200.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0200
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22789
published_at 2026-04-21T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22829
published_at 2026-04-18T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22758
published_at 2026-04-01T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22928
published_at 2026-04-02T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22973
published_at 2026-04-04T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22765
published_at 2026-04-07T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.2284
published_at 2026-04-08T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22893
published_at 2026-04-09T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22914
published_at 2026-04-11T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22877
published_at 2026-04-12T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22821
published_at 2026-04-13T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22834
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0200
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427
8
reference_url http://secunia.com/advisories/55083
reference_id
reference_type
scores
url http://secunia.com/advisories/55083
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0072
reference_id
reference_type
scores
url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0072
11
reference_url http://www.debian.org/security/2013/dsa-2829
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2829
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:088
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:088
13
reference_url http://www.ubuntu.com/usn/USN-1981-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1981-1
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701185
reference_id 701185
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701185
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=902163
reference_id 902163
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=902163
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:2.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:2.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:2.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:2.7.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3a:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.12:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4b:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0200
reference_id CVE-2013-0200
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0200
39
reference_url https://access.redhat.com/errata/RHSA-2013:0500
reference_id RHSA-2013:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0500
40
reference_url https://usn.ubuntu.com/1981-1/
reference_id USN-1981-1
reference_type
scores
url https://usn.ubuntu.com/1981-1/
fixed_packages
0
url pkg:deb/debian/hplip@3.12.6-3.1?distro=trixie
purl pkg:deb/debian/hplip@3.12.6-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.12.6-3.1%3Fdistro=trixie
1
url pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2%3Fdistro=trixie
2
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie
3
url pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
purl pkg:deb/debian/hplip@3.22.10%2Bdfsg0-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-8.1%3Fdistro=trixie
aliases CVE-2013-0200
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y2pa-cbhj-r7az
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.22.10%252Bdfsg0-2%3Fdistro=trixie