Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-jzm6-e1q8-puem
Summary
Multiple vulnerabilities have been found in GPL Ghostscript, the
    worst of which may allow execution of arbitrary code.
Aliases
0
alias CVE-2010-4054
Fixed_packages
0
url pkg:deb/debian/ghostscript@8.71~dfsg-1?distro=trixie
purl pkg:deb/debian/ghostscript@8.71~dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.71~dfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/ghostscript@8.71~dfsg2-9%2Bsqueeze1
purl pkg:deb/debian/ghostscript@8.71~dfsg2-9%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13xq-dznu-bueh
1
vulnerability VCID-16fp-tdk6-sfcc
2
vulnerability VCID-1mjs-khds-v3hb
3
vulnerability VCID-1xn6-drde-gkd4
4
vulnerability VCID-2kb1-haea-eqdd
5
vulnerability VCID-2ncr-54s7-hqfz
6
vulnerability VCID-2xmb-g87r-kuah
7
vulnerability VCID-2ypb-qhkv-1yfe
8
vulnerability VCID-3f72-qcbj-3fev
9
vulnerability VCID-3gax-xvqu-ykhh
10
vulnerability VCID-3sxw-86yd-gqe1
11
vulnerability VCID-479g-vu9e-1ygz
12
vulnerability VCID-48nz-hudd-4kac
13
vulnerability VCID-4c92-nxd1-m7ak
14
vulnerability VCID-4eac-yk5k-mueh
15
vulnerability VCID-4grr-m9cp-x3fm
16
vulnerability VCID-4h4k-fmtp-j7bg
17
vulnerability VCID-4hbu-thvz-6yc3
18
vulnerability VCID-4sqc-r1eq-tbg2
19
vulnerability VCID-4zba-5tgb-nufd
20
vulnerability VCID-6ahc-7gjf-xkc4
21
vulnerability VCID-6xjs-kc8z-ukb8
22
vulnerability VCID-6zft-uqxb-pkh2
23
vulnerability VCID-76r8-79qa-m7h3
24
vulnerability VCID-79q2-phm8-e7cv
25
vulnerability VCID-7anb-rnxg-97h8
26
vulnerability VCID-7ap3-6gs2-fbgs
27
vulnerability VCID-7u9a-5pkt-4fbf
28
vulnerability VCID-7w82-m8sf-dbbg
29
vulnerability VCID-8hfa-4qua-tuab
30
vulnerability VCID-8wed-eqxt-pygs
31
vulnerability VCID-8wfs-knnp-8ub1
32
vulnerability VCID-95yj-ph8u-2fbq
33
vulnerability VCID-98kc-jhsa-ykh9
34
vulnerability VCID-a9h3-mjwf-wuh7
35
vulnerability VCID-ae31-n66y-akcg
36
vulnerability VCID-b1zp-sfch-u3c1
37
vulnerability VCID-barv-t623-h3e5
38
vulnerability VCID-bhab-6cdq-rfew
39
vulnerability VCID-bnpf-udu2-hqbk
40
vulnerability VCID-bp4n-15wn-hbcf
41
vulnerability VCID-c6ms-5wr2-kbfj
42
vulnerability VCID-cb98-64e8-afcm
43
vulnerability VCID-cwmx-9rrx-efcp
44
vulnerability VCID-d73r-gbc9-xkff
45
vulnerability VCID-dax4-v297-afhg
46
vulnerability VCID-dr9w-w81e-qugn
47
vulnerability VCID-e8bh-th45-vfgg
48
vulnerability VCID-ehmh-tjv3-ufhe
49
vulnerability VCID-eqhh-t7qd-vuav
50
vulnerability VCID-eypv-n5ea-abgn
51
vulnerability VCID-f86t-367j-qyas
52
vulnerability VCID-fehm-g4fq-pfb2
53
vulnerability VCID-fzq2-pf9t-6kcp
54
vulnerability VCID-g57e-a8z2-k3dx
55
vulnerability VCID-ge8e-fm7t-gqgj
56
vulnerability VCID-gjj2-k1mt-sbgv
57
vulnerability VCID-gmkv-up69-u7c1
58
vulnerability VCID-gv9z-e7t9-m7g6
59
vulnerability VCID-h7py-se4n-6bdy
60
vulnerability VCID-hc8b-qzqp-pqdn
61
vulnerability VCID-hejr-fkh9-f3hs
62
vulnerability VCID-ht37-jj18-t3c5
63
vulnerability VCID-hy2v-rkzm-nka1
64
vulnerability VCID-j67r-c72d-j7a6
65
vulnerability VCID-jwv8-hkfn-a7gx
66
vulnerability VCID-k2rj-x3d7-ryd2
67
vulnerability VCID-kd8x-74zr-e7dd
68
vulnerability VCID-kjpt-6dws-9ufd
69
vulnerability VCID-kk8v-381v-sybr
70
vulnerability VCID-ktug-1ryc-wbea
71
vulnerability VCID-kw3r-f2mb-cyf6
72
vulnerability VCID-mb3e-psz1-tugh
73
vulnerability VCID-mg71-sbsj-2yam
74
vulnerability VCID-mjce-bddh-bbgc
75
vulnerability VCID-mp48-78e1-xqdy
76
vulnerability VCID-mqgf-gbdy-4uav
77
vulnerability VCID-mr6f-95kb-wfhf
78
vulnerability VCID-msc6-ev6c-1bcn
79
vulnerability VCID-n1r4-f9xj-xbd4
80
vulnerability VCID-n21h-5ck9-43ck
81
vulnerability VCID-n8rh-znkz-tfdt
82
vulnerability VCID-nhtp-m11f-xuh6
83
vulnerability VCID-njhw-89wt-23b1
84
vulnerability VCID-nsan-3rne-7fbw
85
vulnerability VCID-p4e6-xwff-vuax
86
vulnerability VCID-p54p-uq6s-17g4
87
vulnerability VCID-p9qf-vrde-ruhj
88
vulnerability VCID-pjph-6muk-aff3
89
vulnerability VCID-pnwf-fw4h-r3g3
90
vulnerability VCID-ppup-7vp4-v7f1
91
vulnerability VCID-pvfx-6ymq-6qbf
92
vulnerability VCID-q9by-9s2x-z3au
93
vulnerability VCID-qvq2-xbp6-m3fy
94
vulnerability VCID-rbpv-s7ks-37f9
95
vulnerability VCID-s9t8-smvb-wkd4
96
vulnerability VCID-sc3j-2vy3-j3e1
97
vulnerability VCID-sj4u-xzg3-z3hf
98
vulnerability VCID-snzm-pkb8-9fcp
99
vulnerability VCID-szch-k4pu-wubc
100
vulnerability VCID-thz5-yhwy-63fc
101
vulnerability VCID-tp6u-sxuv-a3a6
102
vulnerability VCID-trcm-319g-5qhu
103
vulnerability VCID-tug2-npfa-nkaj
104
vulnerability VCID-u9m8-3kch-ubft
105
vulnerability VCID-ue85-9uqn-xye4
106
vulnerability VCID-uryu-n1p2-mugy
107
vulnerability VCID-v38d-2sr1-7qcf
108
vulnerability VCID-v6k1-wwq9-zfep
109
vulnerability VCID-v7ug-73tf-e7fu
110
vulnerability VCID-vkxy-8vep-x7bg
111
vulnerability VCID-vw3z-bxb8-qkdq
112
vulnerability VCID-wcdw-ygnz-f3aa
113
vulnerability VCID-wpws-24gy-j7g8
114
vulnerability VCID-wtcr-fwz7-j7bk
115
vulnerability VCID-wtv2-9jx7-kkgz
116
vulnerability VCID-x3e7-xtzh-gugf
117
vulnerability VCID-x5ce-v7bc-ufam
118
vulnerability VCID-x6p8-v4bm-nqhs
119
vulnerability VCID-xg1d-bc8m-v7eg
120
vulnerability VCID-xg6e-rnfz-9qd6
121
vulnerability VCID-xsnz-35n8-dyet
122
vulnerability VCID-y99q-qn92-j7gt
123
vulnerability VCID-zbxc-g59q-vyab
124
vulnerability VCID-zj3y-2c49-qfhv
125
vulnerability VCID-zw1d-wcpb-rfbp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.71~dfsg2-9%252Bsqueeze1
2
url pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-j6nh-rfbg-z7f7
2
vulnerability VCID-k837-n44h-pkbm
3
vulnerability VCID-rdmp-hfbg-2kh5
4
vulnerability VCID-t3n4-wrgr-bkdy
5
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie
3
url pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1nh4-crmx-jfb5
1
vulnerability VCID-k837-n44h-pkbm
2
vulnerability VCID-rdmp-hfbg-2kh5
3
vulnerability VCID-t3n4-wrgr-bkdy
4
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k837-n44h-pkbm
1
vulnerability VCID-wzad-uxqp-63h3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
purl pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie
6
url pkg:ebuild/app-text/ghostscript-gpl@9.10-r2
purl pkg:ebuild/app-text/ghostscript-gpl@9.10-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.10-r2
Affected_packages
0
url pkg:deb/debian/ghostscript@8.62.dfsg.1-3.2lenny5
purl pkg:deb/debian/ghostscript@8.62.dfsg.1-3.2lenny5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13xq-dznu-bueh
1
vulnerability VCID-16fp-tdk6-sfcc
2
vulnerability VCID-1mjs-khds-v3hb
3
vulnerability VCID-1w61-4pht-ayaq
4
vulnerability VCID-1xn6-drde-gkd4
5
vulnerability VCID-273p-y942-ekes
6
vulnerability VCID-2hkv-yn4v-6kcy
7
vulnerability VCID-2kb1-haea-eqdd
8
vulnerability VCID-2ncr-54s7-hqfz
9
vulnerability VCID-2xmb-g87r-kuah
10
vulnerability VCID-2ypb-qhkv-1yfe
11
vulnerability VCID-3f72-qcbj-3fev
12
vulnerability VCID-3gax-xvqu-ykhh
13
vulnerability VCID-3sxw-86yd-gqe1
14
vulnerability VCID-42g4-nh4z-m7ev
15
vulnerability VCID-479g-vu9e-1ygz
16
vulnerability VCID-48nz-hudd-4kac
17
vulnerability VCID-4c92-nxd1-m7ak
18
vulnerability VCID-4eac-yk5k-mueh
19
vulnerability VCID-4grr-m9cp-x3fm
20
vulnerability VCID-4h4k-fmtp-j7bg
21
vulnerability VCID-4hbu-thvz-6yc3
22
vulnerability VCID-4sqc-r1eq-tbg2
23
vulnerability VCID-4zba-5tgb-nufd
24
vulnerability VCID-4zzy-q5zp-jkgm
25
vulnerability VCID-6ahc-7gjf-xkc4
26
vulnerability VCID-6xjs-kc8z-ukb8
27
vulnerability VCID-6zft-uqxb-pkh2
28
vulnerability VCID-76r8-79qa-m7h3
29
vulnerability VCID-79q2-phm8-e7cv
30
vulnerability VCID-7anb-rnxg-97h8
31
vulnerability VCID-7ap3-6gs2-fbgs
32
vulnerability VCID-7u9a-5pkt-4fbf
33
vulnerability VCID-7w82-m8sf-dbbg
34
vulnerability VCID-8hfa-4qua-tuab
35
vulnerability VCID-8wed-eqxt-pygs
36
vulnerability VCID-8wfs-knnp-8ub1
37
vulnerability VCID-932v-xwug-nbfy
38
vulnerability VCID-95yj-ph8u-2fbq
39
vulnerability VCID-98kc-jhsa-ykh9
40
vulnerability VCID-a9h3-mjwf-wuh7
41
vulnerability VCID-ae31-n66y-akcg
42
vulnerability VCID-b1zp-sfch-u3c1
43
vulnerability VCID-barv-t623-h3e5
44
vulnerability VCID-bhab-6cdq-rfew
45
vulnerability VCID-bnpf-udu2-hqbk
46
vulnerability VCID-bp4n-15wn-hbcf
47
vulnerability VCID-c6ms-5wr2-kbfj
48
vulnerability VCID-cb98-64e8-afcm
49
vulnerability VCID-cwmx-9rrx-efcp
50
vulnerability VCID-d73r-gbc9-xkff
51
vulnerability VCID-d7z5-jnez-xfaq
52
vulnerability VCID-dax4-v297-afhg
53
vulnerability VCID-dr9w-w81e-qugn
54
vulnerability VCID-e8bh-th45-vfgg
55
vulnerability VCID-ehmh-tjv3-ufhe
56
vulnerability VCID-eqhh-t7qd-vuav
57
vulnerability VCID-eypv-n5ea-abgn
58
vulnerability VCID-f86t-367j-qyas
59
vulnerability VCID-fehm-g4fq-pfb2
60
vulnerability VCID-frrd-yd7x-jkdh
61
vulnerability VCID-fzq2-pf9t-6kcp
62
vulnerability VCID-g57e-a8z2-k3dx
63
vulnerability VCID-ge8e-fm7t-gqgj
64
vulnerability VCID-gjj2-k1mt-sbgv
65
vulnerability VCID-gmkv-up69-u7c1
66
vulnerability VCID-gv9z-e7t9-m7g6
67
vulnerability VCID-h7py-se4n-6bdy
68
vulnerability VCID-hc8b-qzqp-pqdn
69
vulnerability VCID-hejr-fkh9-f3hs
70
vulnerability VCID-hptz-wfa8-y7cp
71
vulnerability VCID-ht37-jj18-t3c5
72
vulnerability VCID-hy2v-rkzm-nka1
73
vulnerability VCID-j67r-c72d-j7a6
74
vulnerability VCID-jwv8-hkfn-a7gx
75
vulnerability VCID-jzm6-e1q8-puem
76
vulnerability VCID-k2rj-x3d7-ryd2
77
vulnerability VCID-kd8x-74zr-e7dd
78
vulnerability VCID-kjpt-6dws-9ufd
79
vulnerability VCID-kk8v-381v-sybr
80
vulnerability VCID-knsr-5uns-z7b1
81
vulnerability VCID-ktug-1ryc-wbea
82
vulnerability VCID-kw3r-f2mb-cyf6
83
vulnerability VCID-mb3e-psz1-tugh
84
vulnerability VCID-mg71-sbsj-2yam
85
vulnerability VCID-mjce-bddh-bbgc
86
vulnerability VCID-mp48-78e1-xqdy
87
vulnerability VCID-mqgf-gbdy-4uav
88
vulnerability VCID-mr6f-95kb-wfhf
89
vulnerability VCID-msc6-ev6c-1bcn
90
vulnerability VCID-n1r4-f9xj-xbd4
91
vulnerability VCID-n21h-5ck9-43ck
92
vulnerability VCID-n8rh-znkz-tfdt
93
vulnerability VCID-nhtp-m11f-xuh6
94
vulnerability VCID-njhw-89wt-23b1
95
vulnerability VCID-nsan-3rne-7fbw
96
vulnerability VCID-p4e6-xwff-vuax
97
vulnerability VCID-p54p-uq6s-17g4
98
vulnerability VCID-p9qf-vrde-ruhj
99
vulnerability VCID-pjph-6muk-aff3
100
vulnerability VCID-pnwf-fw4h-r3g3
101
vulnerability VCID-pprr-k86j-d7c5
102
vulnerability VCID-ppup-7vp4-v7f1
103
vulnerability VCID-pvfx-6ymq-6qbf
104
vulnerability VCID-px5c-mg2t-8uhg
105
vulnerability VCID-q9by-9s2x-z3au
106
vulnerability VCID-qtav-hqnd-b7fa
107
vulnerability VCID-qvq2-xbp6-m3fy
108
vulnerability VCID-rbpv-s7ks-37f9
109
vulnerability VCID-s9t8-smvb-wkd4
110
vulnerability VCID-sc3j-2vy3-j3e1
111
vulnerability VCID-sj4u-xzg3-z3hf
112
vulnerability VCID-snzm-pkb8-9fcp
113
vulnerability VCID-szch-k4pu-wubc
114
vulnerability VCID-thz5-yhwy-63fc
115
vulnerability VCID-tp6u-sxuv-a3a6
116
vulnerability VCID-tqtm-achn-z3fg
117
vulnerability VCID-trcm-319g-5qhu
118
vulnerability VCID-tug2-npfa-nkaj
119
vulnerability VCID-u9m8-3kch-ubft
120
vulnerability VCID-ue85-9uqn-xye4
121
vulnerability VCID-uryu-n1p2-mugy
122
vulnerability VCID-v38d-2sr1-7qcf
123
vulnerability VCID-v6k1-wwq9-zfep
124
vulnerability VCID-v7ug-73tf-e7fu
125
vulnerability VCID-vkxy-8vep-x7bg
126
vulnerability VCID-vw3z-bxb8-qkdq
127
vulnerability VCID-w2bj-tjet-3kbp
128
vulnerability VCID-w823-crw1-vub8
129
vulnerability VCID-wcdw-ygnz-f3aa
130
vulnerability VCID-wpws-24gy-j7g8
131
vulnerability VCID-wtcr-fwz7-j7bk
132
vulnerability VCID-wtv2-9jx7-kkgz
133
vulnerability VCID-x3e7-xtzh-gugf
134
vulnerability VCID-x5ce-v7bc-ufam
135
vulnerability VCID-x6p8-v4bm-nqhs
136
vulnerability VCID-xg1d-bc8m-v7eg
137
vulnerability VCID-xg6e-rnfz-9qd6
138
vulnerability VCID-xsnz-35n8-dyet
139
vulnerability VCID-y99q-qn92-j7gt
140
vulnerability VCID-ymkg-vr2b-dker
141
vulnerability VCID-z1mg-r3dd-73gg
142
vulnerability VCID-zbxc-g59q-vyab
143
vulnerability VCID-zj3y-2c49-qfhv
144
vulnerability VCID-zjc3-q4rm-r3df
145
vulnerability VCID-zw1d-wcpb-rfbp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.62.dfsg.1-3.2lenny5
1
url pkg:rpm/redhat/ghostscript@7.07-33.13?arch=el4
purl pkg:rpm/redhat/ghostscript@7.07-33.13?arch=el4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jzm6-e1q8-puem
1
vulnerability VCID-ymkg-vr2b-dker
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ghostscript@7.07-33.13%3Farch=el4
2
url pkg:rpm/redhat/ghostscript@8.70-6.el5_7?arch=6
purl pkg:rpm/redhat/ghostscript@8.70-6.el5_7?arch=6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d7z5-jnez-xfaq
1
vulnerability VCID-jzm6-e1q8-puem
2
vulnerability VCID-px5c-mg2t-8uhg
3
vulnerability VCID-ymkg-vr2b-dker
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ghostscript@8.70-6.el5_7%3Farch=6
3
url pkg:rpm/redhat/ghostscript@8.70-11.el6_2?arch=6
purl pkg:rpm/redhat/ghostscript@8.70-11.el6_2?arch=6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-d7z5-jnez-xfaq
1
vulnerability VCID-jzm6-e1q8-puem
2
vulnerability VCID-px5c-mg2t-8uhg
3
vulnerability VCID-ymkg-vr2b-dker
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ghostscript@8.70-11.el6_2%3Farch=6
References
0
reference_url http://ghostscript.com/pipermail/gs-cvs/2010-January/010333.html
reference_id
reference_type
scores
url http://ghostscript.com/pipermail/gs-cvs/2010-January/010333.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2012-0096.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-0096.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4054.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4054.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4054
reference_id
reference_type
scores
0
value 0.00476
scoring_system epss
scoring_elements 0.64808
published_at 2026-04-01T12:55:00Z
1
value 0.00476
scoring_system epss
scoring_elements 0.64899
published_at 2026-04-08T12:55:00Z
2
value 0.00476
scoring_system epss
scoring_elements 0.64913
published_at 2026-04-09T12:55:00Z
3
value 0.00476
scoring_system epss
scoring_elements 0.6493
published_at 2026-04-11T12:55:00Z
4
value 0.00476
scoring_system epss
scoring_elements 0.64859
published_at 2026-04-02T12:55:00Z
5
value 0.00476
scoring_system epss
scoring_elements 0.64886
published_at 2026-04-04T12:55:00Z
6
value 0.00476
scoring_system epss
scoring_elements 0.64849
published_at 2026-04-07T12:55:00Z
7
value 0.01874
scoring_system epss
scoring_elements 0.83123
published_at 2026-04-12T12:55:00Z
8
value 0.01874
scoring_system epss
scoring_elements 0.83119
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4054
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4054
5
reference_url http://security.gentoo.org/glsa/glsa-201412-17.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201412-17.xml
6
reference_url https://rhn.redhat.com/errata/RHSA-2012-0095.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2012-0095.html
7
reference_url http://www.kb.cert.org/vuls/id/538191
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/538191
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=646086
reference_id 646086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=646086
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:afpl_ghostscript:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:9.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-4054
reference_id CVE-2010-4054
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-4054
43
reference_url https://security.gentoo.org/glsa/201412-17
reference_id GLSA-201412-17
reference_type
scores
url https://security.gentoo.org/glsa/201412-17
44
reference_url https://access.redhat.com/errata/RHSA-2012:0095
reference_id RHSA-2012:0095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0095
45
reference_url https://access.redhat.com/errata/RHSA-2012:0096
reference_id RHSA-2012:0096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0096
46
reference_url https://usn.ubuntu.com/1317-1/
reference_id USN-1317-1
reference_type
scores
url https://usn.ubuntu.com/1317-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
1
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Exploits
Severity_range_score4.3 - 4.3
Exploitability0.5
Weighted_severity3.9
Risk_score1.9
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-jzm6-e1q8-puem