Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-vca3-gr6w-bkc6
Summary
A vulnerability in CUPS might allow for the execution of arbitrary code or
    a Denial of Service.
Aliases
0
alias CVE-2008-1722
Fixed_packages
0
url pkg:deb/debian/cups@2.4.17-1?distro=trixie
purl pkg:deb/debian/cups@2.4.17-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie
1
url pkg:deb/debian/cups@1.3.7-2?distro=trixie
purl pkg:deb/debian/cups@1.3.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.3.7-2%3Fdistro=trixie
2
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-jy1y-e1nk-p3b4
5
vulnerability VCID-r1q4-2dq2-33ca
6
vulnerability VCID-ry9y-z4e4-yfdh
7
vulnerability VCID-vgtp-sjtt-73e9
8
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie
3
url pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie
purl pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-jy1y-e1nk-p3b4
5
vulnerability VCID-r1q4-2dq2-33ca
6
vulnerability VCID-ry9y-z4e4-yfdh
7
vulnerability VCID-vgtp-sjtt-73e9
8
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie
4
url pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-jy1y-e1nk-p3b4
5
vulnerability VCID-r1q4-2dq2-33ca
6
vulnerability VCID-ry9y-z4e4-yfdh
7
vulnerability VCID-vgtp-sjtt-73e9
8
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/cups@2.4.16-1?distro=trixie
purl pkg:deb/debian/cups@2.4.16-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-r1q4-2dq2-33ca
5
vulnerability VCID-ry9y-z4e4-yfdh
6
vulnerability VCID-vgtp-sjtt-73e9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie
6
url pkg:ebuild/net-print/cups@1.2.12-r8
purl pkg:ebuild/net-print/cups@1.2.12-r8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@1.2.12-r8
Affected_packages
0
url pkg:rpm/redhat/cups@1:1.1.17-13.3?arch=53
purl pkg:rpm/redhat/cups@1:1.1.17-13.3?arch=53
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vca3-gr6w-bkc6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cups@1:1.1.17-13.3%3Farch=53
1
url pkg:rpm/redhat/cups@1:1.1.22-0.rc1.9.20.2.el4_6?arch=8
purl pkg:rpm/redhat/cups@1:1.1.22-0.rc1.9.20.2.el4_6?arch=8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vca3-gr6w-bkc6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cups@1:1.1.22-0.rc1.9.20.2.el4_6%3Farch=8
2
url pkg:rpm/redhat/cups@1:1.2.4-11.18.el5_2?arch=1
purl pkg:rpm/redhat/cups@1:1.2.4-11.18.el5_2?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vca3-gr6w-bkc6
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cups@1:1.2.4-11.18.el5_2%3Farch=1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1722.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1722
reference_id
reference_type
scores
0
value 0.04164
scoring_system epss
scoring_elements 0.88631
published_at 2026-04-01T12:55:00Z
1
value 0.04164
scoring_system epss
scoring_elements 0.8864
published_at 2026-04-02T12:55:00Z
2
value 0.04164
scoring_system epss
scoring_elements 0.88657
published_at 2026-04-04T12:55:00Z
3
value 0.04164
scoring_system epss
scoring_elements 0.88658
published_at 2026-04-07T12:55:00Z
4
value 0.04164
scoring_system epss
scoring_elements 0.88675
published_at 2026-04-08T12:55:00Z
5
value 0.04164
scoring_system epss
scoring_elements 0.88681
published_at 2026-04-09T12:55:00Z
6
value 0.04164
scoring_system epss
scoring_elements 0.88693
published_at 2026-04-11T12:55:00Z
7
value 0.04164
scoring_system epss
scoring_elements 0.88686
published_at 2026-04-12T12:55:00Z
8
value 0.04164
scoring_system epss
scoring_elements 0.88687
published_at 2026-04-13T12:55:00Z
9
value 0.04164
scoring_system epss
scoring_elements 0.887
published_at 2026-04-16T12:55:00Z
10
value 0.04164
scoring_system epss
scoring_elements 0.88697
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1722
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1722
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=441692
reference_id 441692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=441692
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476305
reference_id 476305
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476305
5
reference_url https://security.gentoo.org/glsa/200804-23
reference_id GLSA-200804-23
reference_type
scores
url https://security.gentoo.org/glsa/200804-23
6
reference_url https://access.redhat.com/errata/RHSA-2008:0498
reference_id RHSA-2008:0498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0498
7
reference_url https://usn.ubuntu.com/606-1/
reference_id USN-606-1
reference_type
scores
url https://usn.ubuntu.com/606-1/
8
reference_url https://usn.ubuntu.com/656-1/
reference_id USN-656-1
reference_type
scores
url https://usn.ubuntu.com/656-1/
Weaknesses
0
cwe_id 190
name Integer Overflow or Wraparound
description The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Exploits
Severity_range_scorenull
Exploitability0.5
Weighted_severity0.0
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-vca3-gr6w-bkc6