{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","type":"deb","namespace":"debian","name":"ghostscript","version":"9.53.3~dfsg-7+deb11u7","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"10.07.0~dfsg-2","latest_non_vulnerable_version":"10.07.0~dfsg-2","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78280?format=json","vulnerability_id":"VCID-1nh4-crmx-jfb5","summary":"ghostscript: Integer overflow in pcl/pl/plfont.c:418 in pl_glyph_name","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38560.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38560.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38560","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01721","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01737","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01736","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01739","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01748","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01733","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01723","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38560"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38560","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38560"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224368","reference_id":"2224368","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T18:44:07Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224368"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-38560","reference_id":"CVE-2023-38560","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T18:44:07Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-38560"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=b7eb1d0174c","reference_id":"?p=ghostpdl.git;a=commitdiff;h=b7eb1d0174c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T18:44:07Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=b7eb1d0174c"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=706898","reference_id":"show_bug.cgi?id=706898","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T18:44:07Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=706898"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026095?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1"}],"aliases":["CVE-2023-38560"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1nh4-crmx-jfb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67454?format=json","vulnerability_id":"VCID-7anb-rnxg-97h8","summary":"Artifex Ghostscript: Artifex Ghostscript: Denial of Service via stack-based buffer overflow in pdf_write_cmap","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59798.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59798.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59798","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03631","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03654","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03622","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59798"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116444","reference_id":"1116444","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116444"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397225","reference_id":"2397225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397225"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=0cae41b23a9669e801211dd4cf97b6dadd6dbdd7","reference_id":"?id=0cae41b23a9669e801211dd4cf97b6dadd6dbdd7","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:54:24Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=0cae41b23a9669e801211dd4cf97b6dadd6dbdd7"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708539","reference_id":"show_bug.cgi?id=708539","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:54:24Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708539"},{"reference_url":"https://usn.ubuntu.com/7782-1/","reference_id":"USN-7782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7782-1/"},{"reference_url":"https://usn.ubuntu.com/7904-1/","reference_id":"USN-7904-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7904-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2025-59798"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7anb-rnxg-97h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56851?format=json","vulnerability_id":"VCID-7u9a-5pkt-4fbf","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46956.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46956.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46956","reference_id":"","reference_type":"","scores":[{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55608","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55634","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5561","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55674","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55654","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46956"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325047","reference_id":"2325047","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325047"},{"reference_url":"https://security.gentoo.org/glsa/202501-06","reference_id":"GLSA-202501-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-06"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca","reference_id":"?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7422","reference_id":"RHSA-2025:7422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7499","reference_id":"RHSA-2025:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7499"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707895","reference_id":"show_bug.cgi?id=707895","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707895"},{"reference_url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/","reference_id":"suse-su-20243942-1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/"}],"url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/"},{"reference_url":"https://usn.ubuntu.com/7103-1/","reference_id":"USN-7103-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7103-1/"},{"reference_url":"https://usn.ubuntu.com/7138-1/","reference_id":"USN-7138-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7138-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2024-46956"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7u9a-5pkt-4fbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58216?format=json","vulnerability_id":"VCID-8wfs-knnp-8ub1","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27831.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27831.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27831","reference_id":"","reference_type":"","scores":[{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48492","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48488","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48511","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48485","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48438","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27831"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354963","reference_id":"2354963","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354963"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708132","reference_id":"show_bug.cgi?id=708132","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:39:16Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708132"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2025-27831"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8wfs-knnp-8ub1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56845?format=json","vulnerability_id":"VCID-barv-t623-h3e5","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46951.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46951.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46951","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33919","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34027","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34057","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33987","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33985","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33942","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46951"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325043","reference_id":"2325043","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325043"},{"reference_url":"https://security.gentoo.org/glsa/202501-06","reference_id":"GLSA-202501-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-06"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f49812186baa7d1362880673408a6fbe8719b4f8","reference_id":"?id=f49812186baa7d1362880673408a6fbe8719b4f8","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f49812186baa7d1362880673408a6fbe8719b4f8"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7422","reference_id":"RHSA-2025:7422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7499","reference_id":"RHSA-2025:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7499"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707991","reference_id":"show_bug.cgi?id=707991","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707991"},{"reference_url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/","reference_id":"suse-su-20243942-1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/"}],"url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/"},{"reference_url":"https://usn.ubuntu.com/7103-1/","reference_id":"USN-7103-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7103-1/"},{"reference_url":"https://usn.ubuntu.com/7138-1/","reference_id":"USN-7138-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7138-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2024-46951"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-barv-t623-h3e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58215?format=json","vulnerability_id":"VCID-bnpf-udu2-hqbk","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27830.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27830","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07566","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0766","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07661","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07648","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07642","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354953","reference_id":"2354953","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354953"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708241","reference_id":"show_bug.cgi?id=708241","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:36:52Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708241"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2025-27830"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bnpf-udu2-hqbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58221?format=json","vulnerability_id":"VCID-c6ms-5wr2-kbfj","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27835.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27835.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27835","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07566","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0766","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07661","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07648","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07642","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354947","reference_id":"2354947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354947"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708131","reference_id":"show_bug.cgi?id=708131","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:36:46Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708131"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"},{"reference_url":"https://usn.ubuntu.com/7623-1/","reference_id":"USN-7623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7623-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2025-27835"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c6ms-5wr2-kbfj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56847?format=json","vulnerability_id":"VCID-eypv-n5ea-abgn","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46953.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46953.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46953","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30776","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30592","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30651","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30684","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30644","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46953"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325045","reference_id":"2325045","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325045"},{"reference_url":"https://security.gentoo.org/glsa/202501-06","reference_id":"GLSA-202501-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-06"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=1f21a45df0fa3abec4cff12951022b192dda3c00","reference_id":"?id=1f21a45df0fa3abec4cff12951022b192dda3c00","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=1f21a45df0fa3abec4cff12951022b192dda3c00"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7422","reference_id":"RHSA-2025:7422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7499","reference_id":"RHSA-2025:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7499"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707793","reference_id":"show_bug.cgi?id=707793","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707793"},{"reference_url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/","reference_id":"suse-su-20243942-1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/"}],"url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/"},{"reference_url":"https://usn.ubuntu.com/7103-1/","reference_id":"USN-7103-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7103-1/"},{"reference_url":"https://usn.ubuntu.com/7138-1/","reference_id":"USN-7138-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7138-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2024-46953"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eypv-n5ea-abgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58218?format=json","vulnerability_id":"VCID-gv9z-e7t9-m7g6","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27832.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27832.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27832","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33978","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33938","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33936","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33894","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34009","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33863","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33906","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27832"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27832","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27832"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354949","reference_id":"2354949","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354949"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21915","reference_id":"RHSA-2025:21915","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21915"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22869","reference_id":"RHSA-2025:22869","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23153","reference_id":"RHSA-2025:23153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7586","reference_id":"RHSA-2025:7586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7593","reference_id":"RHSA-2025:7593","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8421","reference_id":"RHSA-2025:8421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8421"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708133","reference_id":"show_bug.cgi?id=708133","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:39:13Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708133"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"},{"reference_url":"https://usn.ubuntu.com/7623-1/","reference_id":"USN-7623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7623-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2025-27832"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gv9z-e7t9-m7g6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79521?format=json","vulnerability_id":"VCID-j6nh-rfbg-z7f7","summary":"ghostscript: Improper release of objects in chunk_free_object during PCL to PDF conversion","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1350.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1350.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1350","reference_id":"","reference_type":"","scores":[{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53729","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53796","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53756","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.5373","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53782","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53828","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53811","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1350"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1350","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1350"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075523","reference_id":"2075523","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075523"},{"reference_url":"https://bugs.ghostscript.com/attachment.cgi?id=22323","reference_id":"attachment.cgi?id=22323","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:15:08Z/"}],"url":"https://bugs.ghostscript.com/attachment.cgi?id=22323"},{"reference_url":"https://vuldb.com/?id.197290","reference_id":"?id.197290","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:15:08Z/"}],"url":"https://vuldb.com/?id.197290"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=705156","reference_id":"show_bug.cgi?id=705156","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:15:08Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=705156"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2022-1350"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j6nh-rfbg-z7f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56850?format=json","vulnerability_id":"VCID-k2rj-x3d7-ryd2","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46955.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46955.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46955","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14697","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14678","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46955"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46955","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46955"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325042","reference_id":"2325042","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325042"},{"reference_url":"https://security.gentoo.org/glsa/202501-06","reference_id":"GLSA-202501-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-06"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=85bd9d2f4b792fe67aef22f1a4117457461b8ba6","reference_id":"?id=85bd9d2f4b792fe67aef22f1a4117457461b8ba6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=85bd9d2f4b792fe67aef22f1a4117457461b8ba6"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707990","reference_id":"show_bug.cgi?id=707990","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707990"},{"reference_url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/","reference_id":"suse-su-20243942-1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/"}],"url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/"},{"reference_url":"https://usn.ubuntu.com/7103-1/","reference_id":"USN-7103-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7103-1/"},{"reference_url":"https://usn.ubuntu.com/7138-1/","reference_id":"USN-7138-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7138-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2024-46955"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k2rj-x3d7-ryd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67455?format=json","vulnerability_id":"VCID-k837-n44h-pkbm","summary":"Artifex Ghostscript: Artifex Ghostscript: Denial of Service via crafted document processing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59800.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59800.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59800","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04372","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04419","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04406","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04441","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04459","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04451","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04396","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59800"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397226","reference_id":"2397226","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397226"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=176cf0188a2294bc307b8caec876f39412e58350","reference_id":"?id=176cf0188a2294bc307b8caec876f39412e58350","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:52:31Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=176cf0188a2294bc307b8caec876f39412e58350"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708602","reference_id":"show_bug.cgi?id=708602","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:52:31Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708602"},{"reference_url":"https://usn.ubuntu.com/7782-1/","reference_id":"USN-7782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7782-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1055270?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2"}],"aliases":["CVE-2025-59800"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k837-n44h-pkbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96936?format=json","vulnerability_id":"VCID-pnwf-fw4h-r3g3","summary":"A vulnerability was found in Artifex GhostPDL up to 3989415a5b8e99b9d1b87cc9902bde9b7cdea145. It has been classified as problematic. This affects the function pdf_ferror of the file devices/vector/gdevpdf.c of the component New Output File Open Error Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The identifier of the patch is 619a106ba4c4abed95110f84d5efcd7aee38c7cb. It is recommended to apply a patch to fix this issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-7462","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22641","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24291","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24329","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24373","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2439","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24348","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-7462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7462"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109270","reference_id":"1109270","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109270"},{"reference_url":"https://artifex.com/","reference_id":"artifex.com","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/"}],"url":"https://artifex.com/"},{"reference_url":"https://vuldb.com/?ctiid.316113","reference_id":"?ctiid.316113","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/"}],"url":"https://vuldb.com/?ctiid.316113"},{"reference_url":"https://vuldb.com/?id.316113","reference_id":"?id.316113","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/"}],"url":"https://vuldb.com/?id.316113"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4","reference_id":"?id=619a106ba4c4","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4"},{"reference_url":"https://vuldb.com/?submit.610173","reference_id":"?submit.610173","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/"}],"url":"https://vuldb.com/?submit.610173"},{"reference_url":"https://usn.ubuntu.com/7782-1/","reference_id":"USN-7782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7782-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2025-7462"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pnwf-fw4h-r3g3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67456?format=json","vulnerability_id":"VCID-pvfx-6ymq-6qbf","summary":"Artifex Ghostscript: From CVEorg collector","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59799.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59799","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03631","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03654","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03622","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116443","reference_id":"1116443","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116443"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397227","reference_id":"2397227","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397227"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=6dab38fb211f15226c242ab7a83fa53e4b0ff781","reference_id":"?id=6dab38fb211f15226c242ab7a83fa53e4b0ff781","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:48:50Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=6dab38fb211f15226c242ab7a83fa53e4b0ff781"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708517","reference_id":"show_bug.cgi?id=708517","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:48:50Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708517"},{"reference_url":"https://usn.ubuntu.com/7782-1/","reference_id":"USN-7782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7782-1/"},{"reference_url":"https://usn.ubuntu.com/7904-1/","reference_id":"USN-7904-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7904-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2025-59799"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pvfx-6ymq-6qbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69514?format=json","vulnerability_id":"VCID-rdmp-hfbg-2kh5","summary":"Ghostscript: Ghostscript Argument Sanitization Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48708.json","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48708.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-48708","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06732","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06678","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06739","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06633","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-48708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48708"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368134","reference_id":"2368134","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368134"},{"reference_url":"https://security.archlinux.org/ASA-202505-15","reference_id":"ASA-202505-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-15"},{"reference_url":"https://security.archlinux.org/AVG-2883","reference_id":"AVG-2883","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2883"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b587663c623b4462f9e78686a31fd880207303ee","reference_id":"?id=b587663c623b4462f9e78686a31fd880207303ee","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-23T13:21:22Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b587663c623b4462f9e78686a31fd880207303ee"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708446","reference_id":"show_bug.cgi?id=708446","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-23T13:21:22Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708446"},{"reference_url":"https://usn.ubuntu.com/7623-1/","reference_id":"USN-7623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7623-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026095?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1"}],"aliases":["CVE-2025-48708"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rdmp-hfbg-2kh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75006?format=json","vulnerability_id":"VCID-t3n4-wrgr-bkdy","summary":"ghostscript: ghostscript: arbitrary file read/write through Tesseract configuration","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29511.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29511","reference_id":"","reference_type":"","scores":[{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73692","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73653","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73677","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.7365","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73719","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73701","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29511"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295648","reference_id":"2295648","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295648"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/07/03/7","reference_id":"7","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-05T15:17:09Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/07/03/7"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=3d4cfdc1a44","reference_id":"?p=ghostpdl.git%3Ba=commitdiff%3Bh=3d4cfdc1a44","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-05T15:17:09Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=3d4cfdc1a44"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510","reference_id":"show_bug.cgi?id=707510","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-05T15:17:09Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510"},{"reference_url":"https://usn.ubuntu.com/6897-1/","reference_id":"USN-6897-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6897-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026095?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1"}],"aliases":["CVE-2024-29511"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t3n4-wrgr-bkdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75002?format=json","vulnerability_id":"VCID-wtv2-9jx7-kkgz","summary":"ghostscript: heap pointer leak in pdf_base_font_alloc()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29508.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29508","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10166","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10061","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10198","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10235","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10195","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29508"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295627","reference_id":"2295627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295627"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/07/03/7","reference_id":"7","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:49:12Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/07/03/7"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Bh=ff1013a0ab485b66783b70145e342a82c670906a","reference_id":"?p=ghostpdl.git%3Bh=ff1013a0ab485b66783b70145e342a82c670906a","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:49:12Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Bh=ff1013a0ab485b66783b70145e342a82c670906a"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510","reference_id":"show_bug.cgi?id=707510","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:49:12Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510"},{"reference_url":"https://usn.ubuntu.com/6897-1/","reference_id":"USN-6897-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6897-1/"},{"reference_url":"https://usn.ubuntu.com/7623-1/","reference_id":"USN-7623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7623-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2024-29508"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wtv2-9jx7-kkgz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96825?format=json","vulnerability_id":"VCID-wzad-uxqp-63h3","summary":"In Artifex GhostXPS before 10.06.0, there is a stack-based buffer overflow in xps_unpredict_tiff in xpstiff.c because the samplesperpixel value is not checked.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59801","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03929","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04005","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03975","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03958","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03953","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0398","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03987","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59801"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=99727069197d548a8db69ba5d63f766bff40eaab","reference_id":"?id=99727069197d548a8db69ba5d63f766bff40eaab","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:53:38Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=99727069197d548a8db69ba5d63f766bff40eaab"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708819","reference_id":"show_bug.cgi?id=708819","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:53:38Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708819"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1055270?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2"}],"aliases":["CVE-2025-59801"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wzad-uxqp-63h3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58222?format=json","vulnerability_id":"VCID-x5ce-v7bc-ufam","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27836.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27836","reference_id":"","reference_type":"","scores":[{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43371","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43376","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43403","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43422","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43391","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43399","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43337","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43389","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27836"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354952","reference_id":"2354952","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354952"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708192","reference_id":"show_bug.cgi?id=708192","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:18:16Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708192"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"},{"reference_url":"https://usn.ubuntu.com/7623-1/","reference_id":"USN-7623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7623-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026094?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8"}],"aliases":["CVE-2025-27836"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x5ce-v7bc-ufam"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61673?format=json","vulnerability_id":"VCID-16fp-tdk6-sfcc","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33869.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33869.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33869","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02705","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02708","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02699","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02685","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02684","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02698","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/06/28/2","reference_id":"2","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T20:27:59Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/06/28/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293958","reference_id":"2293958","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293958"},{"reference_url":"https://security.gentoo.org/glsa/202409-03","reference_id":"GLSA-202409-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6197","reference_id":"RHSA-2024:6197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6466","reference_id":"RHSA-2024:6466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6466"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707691","reference_id":"show_bug.cgi?id=707691","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T20:27:59Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707691"},{"reference_url":"https://usn.ubuntu.com/6835-1/","reference_id":"USN-6835-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6835-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2024-33869"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-16fp-tdk6-sfcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48785?format=json","vulnerability_id":"VCID-1xn6-drde-gkd4","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14812.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14812.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14812","reference_id":"","reference_type":"","scores":[{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67658","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67734","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67693","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67744","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67758","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743754","reference_id":"1743754","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743754"},{"reference_url":"https://security.archlinux.org/ASA-201911-5","reference_id":"ASA-201911-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-5"},{"reference_url":"https://security.archlinux.org/AVG-1031","reference_id":"AVG-1031","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1031"},{"reference_url":"https://security.gentoo.org/glsa/202004-03","reference_id":"GLSA-202004-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2534","reference_id":"RHSA-2019:2534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2586","reference_id":"RHSA-2019:2586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2591","reference_id":"RHSA-2019:2591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2591"},{"reference_url":"https://usn.ubuntu.com/4111-1/","reference_id":"USN-4111-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4111-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037127?format=json","purl":"pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-2ypb-qhkv-1yfe"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-6zft-uqxb-pkh2"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8hfa-4qua-tuab"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gjj2-k1mt-sbgv"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kk8v-381v-sybr"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26a~dfsg-0%252Bdeb9u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2019-14812"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xn6-drde-gkd4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43791?format=json","vulnerability_id":"VCID-2ncr-54s7-hqfz","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could result in remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36664.json","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-36664","reference_id":"","reference_type":"","scores":[{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.91014","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.91059","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.91022","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.91032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.91045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.91051","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.9106","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-36664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36664"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2217798","reference_id":"2217798","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2217798"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ICXN5VPF3WJCYKMPSYER5KHTPJXSTJZ/","reference_id":"2ICXN5VPF3WJCYKMPSYER5KHTPJXSTJZ","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ICXN5VPF3WJCYKMPSYER5KHTPJXSTJZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EWMEK2UPCUU3ZLL7VASE5CEHDQY4VKV/","reference_id":"5EWMEK2UPCUU3ZLL7VASE5CEHDQY4VKV","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EWMEK2UPCUU3ZLL7VASE5CEHDQY4VKV/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5446","reference_id":"dsa-5446","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://www.debian.org/security/2023/dsa-5446"},{"reference_url":"https://security.gentoo.org/glsa/202309-03","reference_id":"GLSA-202309-03","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://security.gentoo.org/glsa/202309-03"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0974e4f2ac0005d3731e0b5c13ebc7e965540f4d","reference_id":"?p=ghostpdl.git%3Ba=commit%3Bh=0974e4f2ac0005d3731e0b5c13ebc7e965540f4d","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0974e4f2ac0005d3731e0b5c13ebc7e965540f4d"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=505eab7782b429017eb434b2b95120855f2b0e3c","reference_id":"?p=ghostpdl.git%3Ba=commit%3Bh=505eab7782b429017eb434b2b95120855f2b0e3c","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=505eab7782b429017eb434b2b95120855f2b0e3c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4324","reference_id":"RHSA-2023:4324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5459","reference_id":"RHSA-2023:5459","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5459"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=706761","reference_id":"show_bug.cgi?id=706761","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=706761"},{"reference_url":"https://usn.ubuntu.com/6213-1/","reference_id":"USN-6213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6213-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2023-36664"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ncr-54s7-hqfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61671?format=json","vulnerability_id":"VCID-3gax-xvqu-ykhh","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52722.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52722.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52722","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1805","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17877","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17894","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17955","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17971","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17926","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18104","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/06/28/2","reference_id":"2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T19:14:51Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/06/28/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278775","reference_id":"2278775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278775"},{"reference_url":"https://security.gentoo.org/glsa/202409-03","reference_id":"GLSA-202409-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-03"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1","reference_id":"?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T19:14:51Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1"},{"reference_url":"https://usn.ubuntu.com/6835-1/","reference_id":"USN-6835-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6835-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2023-52722"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3gax-xvqu-ykhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48783?format=json","vulnerability_id":"VCID-3sxw-86yd-gqe1","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10216.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10216.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10216","reference_id":"","reference_type":"","scores":[{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66942","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.6698","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67005","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66978","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67028","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67041","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.6706","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67046","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67015","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10216"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1737080","reference_id":"1737080","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1737080"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934638","reference_id":"934638","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934638"},{"reference_url":"https://security.gentoo.org/glsa/202004-03","reference_id":"GLSA-202004-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2462","reference_id":"RHSA-2019:2462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2465","reference_id":"RHSA-2019:2465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2534","reference_id":"RHSA-2019:2534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2534"},{"reference_url":"https://usn.ubuntu.com/4092-1/","reference_id":"USN-4092-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4092-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037127?format=json","purl":"pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-2ypb-qhkv-1yfe"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-6zft-uqxb-pkh2"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8hfa-4qua-tuab"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gjj2-k1mt-sbgv"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kk8v-381v-sybr"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26a~dfsg-0%252Bdeb9u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2019-10216"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3sxw-86yd-gqe1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48784?format=json","vulnerability_id":"VCID-479g-vu9e-1ygz","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html"},{"reference_url":"https://access.redhat.com/errata/RHBA-2019:2824","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:2824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2594","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2594"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14811.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14811","reference_id":"","reference_type":"","scores":[{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82354","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82427","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82382","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.8241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82417","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82436","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82432","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82386","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14811"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14811","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/15","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/15"},{"reference_url":"https://www.debian.org/security/2019/dsa-4518","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4518"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743757","reference_id":"1743757","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743757"},{"reference_url":"https://security.archlinux.org/ASA-201911-5","reference_id":"ASA-201911-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-5"},{"reference_url":"https://security.archlinux.org/AVG-1031","reference_id":"AVG-1031","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1031"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14811","reference_id":"CVE-2019-14811","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14811"},{"reference_url":"https://security.gentoo.org/glsa/202004-03","reference_id":"GLSA-202004-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2534","reference_id":"RHSA-2019:2534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2586","reference_id":"RHSA-2019:2586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2591","reference_id":"RHSA-2019:2591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2591"},{"reference_url":"https://usn.ubuntu.com/4111-1/","reference_id":"USN-4111-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4111-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037127?format=json","purl":"pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-2ypb-qhkv-1yfe"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-6zft-uqxb-pkh2"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8hfa-4qua-tuab"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gjj2-k1mt-sbgv"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kk8v-381v-sybr"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26a~dfsg-0%252Bdeb9u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2019-14811"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-479g-vu9e-1ygz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60674?format=json","vulnerability_id":"VCID-4eac-yk5k-mueh","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16307.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16307.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16307","reference_id":"","reference_type":"","scores":[{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82582","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82597","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82634","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82642","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82649","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870162","reference_id":"1870162","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870162"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16307"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4eac-yk5k-mueh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60665?format=json","vulnerability_id":"VCID-4grr-m9cp-x3fm","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16298.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16298.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16298","reference_id":"","reference_type":"","scores":[{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.8059","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870152","reference_id":"1870152","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870152"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16298"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4grr-m9cp-x3fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78148?format=json","vulnerability_id":"VCID-4h4k-fmtp-j7bg","summary":"ghostscript: Divide by zero in eps_print_page in gdevepsn.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21710.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21710.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-21710","reference_id":"","reference_type":"","scores":[{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59058","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.5913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59165","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59169","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59182","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59202","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59118","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-21710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21710"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235001","reference_id":"2235001","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235001"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T20:07:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=4e713293de84b689c4ab358f3e110ea54aa81925","reference_id":"?p=ghostpdl.git%3Ba=commit%3Bh=4e713293de84b689c4ab358f3e110ea54aa81925","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T20:07:44Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=4e713293de84b689c4ab358f3e110ea54aa81925"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2966","reference_id":"RHSA-2024:2966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2966"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=701843","reference_id":"show_bug.cgi?id=701843","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T20:07:44Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=701843"},{"reference_url":"https://usn.ubuntu.com/6364-1/","reference_id":"USN-6364-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6364-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-21710"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4h4k-fmtp-j7bg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77769?format=json","vulnerability_id":"VCID-4zba-5tgb-nufd","summary":"Ghostscript: out-of-bounds write and use-after-free in devices/vector/gdevtxtw.c (for txtwrite)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36773.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36773.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-36773","reference_id":"","reference_type":"","scores":[{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28704","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28786","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28745","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28749","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28705","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-36773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36773"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262734","reference_id":"2262734","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262734"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/tag/gs9530","reference_id":"gs9530","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-05T15:56:53Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/tag/gs9530"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=8c7bd787defa071c96289b7da9397f673fddb874","reference_id":"?p=ghostpdl.git%3Ba=commit%3Bh=8c7bd787defa071c96289b7da9397f673fddb874","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-05T15:56:53Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=8c7bd787defa071c96289b7da9397f673fddb874"},{"reference_url":"https://bugzilla.opensuse.org/show_bug.cgi?id=1177922","reference_id":"show_bug.cgi?id=1177922","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-05T15:56:53Z/"}],"url":"https://bugzilla.opensuse.org/show_bug.cgi?id=1177922"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=702229","reference_id":"show_bug.cgi?id=702229","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-05T15:56:53Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=702229"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-36773"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4zba-5tgb-nufd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60662?format=json","vulnerability_id":"VCID-79q2-phm8-e7cv","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16295.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16295.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16295","reference_id":"","reference_type":"","scores":[{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64381","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64419","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64434","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64447","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64406","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870179","reference_id":"1870179","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870179"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16295"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-79q2-phm8-e7cv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60664?format=json","vulnerability_id":"VCID-7ap3-6gs2-fbgs","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16297.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16297.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16297","reference_id":"","reference_type":"","scores":[{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62636","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62659","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68365","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68342","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68392","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68409","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68436","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68325","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870227","reference_id":"1870227","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870227"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16297"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ap3-6gs2-fbgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60669?format=json","vulnerability_id":"VCID-8wed-eqxt-pygs","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16302.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16302.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16302","reference_id":"","reference_type":"","scores":[{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73839","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73875","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73846","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73916","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73889","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870267","reference_id":"1870267","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870267"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16302"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8wed-eqxt-pygs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79246?format=json","vulnerability_id":"VCID-95yj-ph8u-2fbq","summary":"security update","references":[{"reference_url":"http://jvn.jp/en/jp/JVN52486659/index.html","reference_id":"","reference_type":"","scores":[],"url":"http://jvn.jp/en/jp/JVN52486659/index.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00050.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00050.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14869.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14869.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14869","reference_id":"","reference_type":"","scores":[{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50398","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50486","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50529","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50506","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50454","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50482","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14869"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=701841","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=701841"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14869","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14869"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=485904772c5f","reference_id":"","reference_type":"","scores":[],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=485904772c5f"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Q4E3OTDAJRSUCOBTDQO7Y5UTE2FFMLF/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Q4E3OTDAJRSUCOBTDQO7Y5UTE2FFMLF/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HC4REO73BEJOJAU7NHFHJECAUAYJUE3H/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HC4REO73BEJOJAU7NHFHJECAUAYJUE3H/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IX55AEDERTDFEZAROKZW64MZRPLINEGI/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IX55AEDERTDFEZAROKZW64MZRPLINEGI/"},{"reference_url":"https://seclists.org/bugtraq/2019/Nov/27","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Nov/27"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/11/15/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/11/15/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1768911","reference_id":"1768911","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1768911"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944760","reference_id":"944760","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944760"},{"reference_url":"https://security.archlinux.org/AVG-1069","reference_id":"AVG-1069","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1069"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14869","reference_id":"CVE-2019-14869","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3888","reference_id":"RHSA-2019:3888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3890","reference_id":"RHSA-2019:3890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0222","reference_id":"RHSA-2020:0222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0222"},{"reference_url":"https://usn.ubuntu.com/4193-1/","reference_id":"USN-4193-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4193-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037127?format=json","purl":"pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-2ypb-qhkv-1yfe"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-6zft-uqxb-pkh2"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8hfa-4qua-tuab"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gjj2-k1mt-sbgv"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kk8v-381v-sybr"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26a~dfsg-0%252Bdeb9u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2019-14869"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-95yj-ph8u-2fbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60663?format=json","vulnerability_id":"VCID-ae31-n66y-akcg","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16296.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16296.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16296","reference_id":"","reference_type":"","scores":[{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62704","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62761","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62791","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62807","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62824","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62831","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870175","reference_id":"1870175","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870175"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16296"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ae31-n66y-akcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60676?format=json","vulnerability_id":"VCID-b1zp-sfch-u3c1","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16309.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16309.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16309","reference_id":"","reference_type":"","scores":[{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80902","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80933","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.8093","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80965","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80968","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80959","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870248","reference_id":"1870248","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870248"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16309"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b1zp-sfch-u3c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78149?format=json","vulnerability_id":"VCID-e8bh-th45-vfgg","summary":"ghostscript: Heap buffer overflow in clj_media_size function in devices/gdevclj.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21890.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21890.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-21890","reference_id":"","reference_type":"","scores":[{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.7909","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79097","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79151","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79166","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79123","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79134","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-21890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21890"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235002","reference_id":"2235002","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235002"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-04T16:13:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=701846","reference_id":"show_bug.cgi?id=701846","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-04T16:13:44Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=701846"},{"reference_url":"https://usn.ubuntu.com/6364-1/","reference_id":"USN-6364-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6364-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-21890"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e8bh-th45-vfgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48787?format=json","vulnerability_id":"VCID-eqhh-t7qd-vuav","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=cd1b1cacadac2479e291efe611979bdc1b3bdb19","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=cd1b1cacadac2479e291efe611979bdc1b3bdb19"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html"},{"reference_url":"https://access.redhat.com/errata/RHBA-2019:2824","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:2824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2594","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2594"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14817.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14817.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14817","reference_id":"","reference_type":"","scores":[{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58231","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58337","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58365","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58371","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58388","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58317","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14817"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14817","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/15","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/15"},{"reference_url":"https://www.debian.org/security/2019/dsa-4518","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4518"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1744042","reference_id":"1744042","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1744042"},{"reference_url":"https://security.archlinux.org/ASA-201911-5","reference_id":"ASA-201911-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-5"},{"reference_url":"https://security.archlinux.org/AVG-1031","reference_id":"AVG-1031","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1031"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14817","reference_id":"CVE-2019-14817","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14817"},{"reference_url":"https://security.gentoo.org/glsa/202004-03","reference_id":"GLSA-202004-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2534","reference_id":"RHSA-2019:2534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2586","reference_id":"RHSA-2019:2586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2591","reference_id":"RHSA-2019:2591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2591"},{"reference_url":"https://usn.ubuntu.com/4111-1/","reference_id":"USN-4111-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4111-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037127?format=json","purl":"pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-2ypb-qhkv-1yfe"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-6zft-uqxb-pkh2"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8hfa-4qua-tuab"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gjj2-k1mt-sbgv"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kk8v-381v-sybr"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26a~dfsg-0%252Bdeb9u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2019-14817"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eqhh-t7qd-vuav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60673?format=json","vulnerability_id":"VCID-fehm-g4fq-pfb2","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16306.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16306.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16306","reference_id":"","reference_type":"","scores":[{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82582","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82597","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82634","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82642","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82649","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870165","reference_id":"1870165","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870165"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16306"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fehm-g4fq-pfb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60657?format=json","vulnerability_id":"VCID-ge8e-fm7t-gqgj","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16290.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16290.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16290","reference_id":"","reference_type":"","scores":[{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.8059","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870149","reference_id":"1870149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870149"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16290"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ge8e-fm7t-gqgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78080?format=json","vulnerability_id":"VCID-h7py-se4n-6bdy","summary":"Ghostscript: GhostPDL can lead to remote code execution via crafted PostScript documents","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43115.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43115.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43115","reference_id":"","reference_type":"","scores":[{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95711","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95718","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95721","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.9573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95733","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95737","published_at":"2026-04-11T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95738","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43115"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43115","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43115"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241108","reference_id":"2241108","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5868","reference_id":"RHSA-2023:5868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6265","reference_id":"RHSA-2023:6265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6732","reference_id":"RHSA-2023:6732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6732"},{"reference_url":"https://usn.ubuntu.com/6433-1/","reference_id":"USN-6433-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6433-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2023-43115"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h7py-se4n-6bdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61674?format=json","vulnerability_id":"VCID-hc8b-qzqp-pqdn","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33870.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33870.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33870","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23384","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23335","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23458","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23477","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23439","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23516","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23552","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/06/28/2","reference_id":"2","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:38:36Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/06/28/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293959","reference_id":"2293959","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293959"},{"reference_url":"https://security.gentoo.org/glsa/202409-03","reference_id":"GLSA-202409-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6197","reference_id":"RHSA-2024:6197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6466","reference_id":"RHSA-2024:6466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6466"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707686","reference_id":"show_bug.cgi?id=707686","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:38:36Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707686"},{"reference_url":"https://usn.ubuntu.com/6835-1/","reference_id":"USN-6835-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6835-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2024-33870"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hc8b-qzqp-pqdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60678?format=json","vulnerability_id":"VCID-ht37-jj18-t3c5","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17538.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17538.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-17538","reference_id":"","reference_type":"","scores":[{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.7154","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71565","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71577","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71588","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71596","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-17538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870249","reference_id":"1870249","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870249"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-17538"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ht37-jj18-t3c5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60667?format=json","vulnerability_id":"VCID-hy2v-rkzm-nka1","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16300.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16300.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16300","reference_id":"","reference_type":"","scores":[{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77947","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870169","reference_id":"1870169","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870169"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16300"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hy2v-rkzm-nka1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60670?format=json","vulnerability_id":"VCID-kd8x-74zr-e7dd","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16303.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16303.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16303","reference_id":"","reference_type":"","scores":[{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.8638","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86408","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86409","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86428","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86438","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86452","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86451","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86445","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870258","reference_id":"1870258","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870258"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16303"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kd8x-74zr-e7dd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60672?format=json","vulnerability_id":"VCID-kjpt-6dws-9ufd","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16305.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16305.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16305","reference_id":"","reference_type":"","scores":[{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64669","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64722","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.6475","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64771","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64749","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870257","reference_id":"1870257","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870257"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16305"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kjpt-6dws-9ufd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60653?format=json","vulnerability_id":"VCID-kw3r-f2mb-cyf6","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15900.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15900.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15900","reference_id":"","reference_type":"","scores":[{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93401","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93409","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93428","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93434","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93435","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15900"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1859492","reference_id":"1859492","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1859492"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://usn.ubuntu.com/4445-1/","reference_id":"USN-4445-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4445-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-15900"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kw3r-f2mb-cyf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36089?format=json","vulnerability_id":"VCID-mg71-sbsj-2yam","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3781.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3781","reference_id":"","reference_type":"","scores":[{"value":"0.06952","scoring_system":"epss","scoring_elements":"0.91437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.91454","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.91463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.9147","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.91448","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.91483","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.91489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.91495","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07893","scoring_system":"epss","scoring_elements":"0.92024","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3781"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2002271","reference_id":"2002271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2002271"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994011","reference_id":"994011","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994011"},{"reference_url":"https://security.archlinux.org/ASA-202109-3","reference_id":"ASA-202109-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202109-3"},{"reference_url":"https://security.archlinux.org/AVG-2374","reference_id":"AVG-2374","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2374"},{"reference_url":"https://security.gentoo.org/glsa/202211-11","reference_id":"GLSA-202211-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-11"},{"reference_url":"https://usn.ubuntu.com/5075-1/","reference_id":"USN-5075-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5075-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2021-3781"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mg71-sbsj-2yam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60655?format=json","vulnerability_id":"VCID-mqgf-gbdy-4uav","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16288.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16288.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16288","reference_id":"","reference_type":"","scores":[{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77947","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870266","reference_id":"1870266","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870266"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16288"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mqgf-gbdy-4uav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43786?format=json","vulnerability_id":"VCID-mr6f-95kb-wfhf","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could result in remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28879.json","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28879.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28879","reference_id":"","reference_type":"","scores":[{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96742","published_at":"2026-04-02T12:55:00Z"},{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96743","published_at":"2026-04-04T12:55:00Z"},{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96747","published_at":"2026-04-07T12:55:00Z"},{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96754","published_at":"2026-04-08T12:55:00Z"},{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96755","published_at":"2026-04-09T12:55:00Z"},{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96758","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28879"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033757","reference_id":"1033757","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184585","reference_id":"2184585","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184585"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/04/12/4","reference_id":"4","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/04/12/4"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/","reference_id":"CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/","reference_id":"DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5383","reference_id":"dsa-5383","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://www.debian.org/security/2023/dsa-5383"},{"reference_url":"https://security.gentoo.org/glsa/202309-03","reference_id":"GLSA-202309-03","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://security.gentoo.org/glsa/202309-03"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/","reference_id":"MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html"},{"reference_url":"https://ghostscript.readthedocs.io/en/latest/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://ghostscript.readthedocs.io/en/latest/News.html"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179","reference_id":"?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6544","reference_id":"RHSA-2023:6544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7053","reference_id":"RHSA-2023:7053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7053"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=706494","reference_id":"show_bug.cgi?id=706494","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=706494"},{"reference_url":"https://usn.ubuntu.com/6017-1/","reference_id":"USN-6017-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6017-1/"},{"reference_url":"https://usn.ubuntu.com/6017-2/","reference_id":"USN-6017-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6017-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2023-28879"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mr6f-95kb-wfhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60661?format=json","vulnerability_id":"VCID-n8rh-znkz-tfdt","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16294.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16294.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16294","reference_id":"","reference_type":"","scores":[{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72951","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72983","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.7301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73034","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73013","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73007","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870229","reference_id":"1870229","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870229"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16294"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n8rh-znkz-tfdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60658?format=json","vulnerability_id":"VCID-nhtp-m11f-xuh6","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16291.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16291.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16291","reference_id":"","reference_type":"","scores":[{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62636","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62659","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79263","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79273","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.7928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79305","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79232","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870240","reference_id":"1870240","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870240"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16291"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nhtp-m11f-xuh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81876?format=json","vulnerability_id":"VCID-nsan-3rne-7fbw","summary":"ghostscript: heap buffer over write vulnerability in GhostScript's lp8000_print_page() in gdevlp8k.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27792.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27792.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27792","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13853","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13911","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1376","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16985","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1694","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16863","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1701","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27792"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2247179","reference_id":"2247179","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2247179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://usn.ubuntu.com/5618-1/","reference_id":"USN-5618-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5618-1/"},{"reference_url":"https://usn.ubuntu.com/5643-1/","reference_id":"USN-5643-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5643-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-27792"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nsan-3rne-7fbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61675?format=json","vulnerability_id":"VCID-pjph-6muk-aff3","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33871.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33871","reference_id":"","reference_type":"","scores":[{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72059","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72023","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72019","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72068","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72091","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72075","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/06/28/2","reference_id":"2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-05T14:13:10Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/06/28/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283508","reference_id":"2283508","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283508"},{"reference_url":"https://security.gentoo.org/glsa/202409-03","reference_id":"GLSA-202409-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-03"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=7145885041bb52cc23964f0aa2aec1b1c82b5908","reference_id":"?id=7145885041bb52cc23964f0aa2aec1b1c82b5908","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-05T14:13:10Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=7145885041bb52cc23964f0aa2aec1b1c82b5908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3999","reference_id":"RHSA-2024:3999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4000","reference_id":"RHSA-2024:4000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4014","reference_id":"RHSA-2024:4014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4462","reference_id":"RHSA-2024:4462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4527","reference_id":"RHSA-2024:4527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4537","reference_id":"RHSA-2024:4537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4541","reference_id":"RHSA-2024:4541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4544","reference_id":"RHSA-2024:4544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4549","reference_id":"RHSA-2024:4549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4549"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707754","reference_id":"show_bug.cgi?id=707754","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-05T14:13:10Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707754"},{"reference_url":"https://usn.ubuntu.com/6835-1/","reference_id":"USN-6835-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6835-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2024-33871"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pjph-6muk-aff3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61672?format=json","vulnerability_id":"VCID-q9by-9s2x-z3au","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29510.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29510.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29510","reference_id":"","reference_type":"","scores":[{"value":"0.06906","scoring_system":"epss","scoring_elements":"0.91351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.9222","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.92199","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.92202","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.92214","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.92217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.92222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.92223","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293950","reference_id":"2293950","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293950"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/07/03/7","reference_id":"7","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T13:49:45Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/07/03/7"},{"reference_url":"https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/","reference_id":"cve-2024-29510-ghostscript-format-string-exploitation","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T13:49:45Z/"}],"url":"https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/"},{"reference_url":"https://security.gentoo.org/glsa/202409-03","reference_id":"GLSA-202409-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6197","reference_id":"RHSA-2024:6197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6466","reference_id":"RHSA-2024:6466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6466"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707662","reference_id":"show_bug.cgi?id=707662","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T13:49:45Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707662"},{"reference_url":"https://usn.ubuntu.com/6835-1/","reference_id":"USN-6835-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6835-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2024-29510"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q9by-9s2x-z3au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60666?format=json","vulnerability_id":"VCID-qvq2-xbp6-m3fy","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16299.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16299.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16299","reference_id":"","reference_type":"","scores":[{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74477","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74499","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74471","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870171","reference_id":"1870171","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870171"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16299"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qvq2-xbp6-m3fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60671?format=json","vulnerability_id":"VCID-s9t8-smvb-wkd4","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16304.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16304.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16304","reference_id":"","reference_type":"","scores":[{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56008","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56117","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56137","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56168","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56173","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64772","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870262","reference_id":"1870262","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870262"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16304"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s9t8-smvb-wkd4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60677?format=json","vulnerability_id":"VCID-sj4u-xzg3-z3hf","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16310.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16310.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16310","reference_id":"","reference_type":"","scores":[{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.8268","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82696","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82709","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82706","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82731","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82738","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82755","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82749","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82746","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870159","reference_id":"1870159","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870159"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16310"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sj4u-xzg3-z3hf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60659?format=json","vulnerability_id":"VCID-snzm-pkb8-9fcp","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16292.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16292.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16292","reference_id":"","reference_type":"","scores":[{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77947","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870237","reference_id":"1870237","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870237"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16292"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-snzm-pkb8-9fcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60654?format=json","vulnerability_id":"VCID-thz5-yhwy-63fc","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16287.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16287.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16287","reference_id":"","reference_type":"","scores":[{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.8059","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870242","reference_id":"1870242","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870242"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16287"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-thz5-yhwy-63fc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60660?format=json","vulnerability_id":"VCID-tp6u-sxuv-a3a6","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16293.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16293.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16293","reference_id":"","reference_type":"","scores":[{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79749","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79757","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79778","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79793","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.798","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79822","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79806","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79799","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870231","reference_id":"1870231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870231"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16293"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tp6u-sxuv-a3a6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78279?format=json","vulnerability_id":"VCID-trcm-319g-5qhu","summary":"ghostscript: Out-of-bound read in base/gdevdevn.c:1973 in devn_pcx_write_rle could result in DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38559.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38559.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38559","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01946","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01959","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01957","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01958","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01973","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01937","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38559"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043033","reference_id":"1043033","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043033"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224367","reference_id":"2224367","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224367"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6544","reference_id":"RHSA-2023:6544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7053","reference_id":"RHSA-2023:7053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7053"},{"reference_url":"https://usn.ubuntu.com/6297-1/","reference_id":"USN-6297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6297-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2023-38559"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-trcm-319g-5qhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79841?format=json","vulnerability_id":"VCID-ue85-9uqn-xye4","summary":"ghostscript: use-after-free in sampled_data_sample may lead to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45944.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45944.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45944","reference_id":"","reference_type":"","scores":[{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79078","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79085","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79112","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79097","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.7914","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.7913","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45944"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45944","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45944"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45949"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2048916","reference_id":"2048916","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2048916"},{"reference_url":"https://usn.ubuntu.com/5224-1/","reference_id":"USN-5224-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5224-1/"},{"reference_url":"https://usn.ubuntu.com/5224-2/","reference_id":"USN-5224-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5224-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2021-45944"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ue85-9uqn-xye4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60675?format=json","vulnerability_id":"VCID-uryu-n1p2-mugy","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16308.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16308.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16308","reference_id":"","reference_type":"","scores":[{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77947","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870256","reference_id":"1870256","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870256"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16308"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uryu-n1p2-mugy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48786?format=json","vulnerability_id":"VCID-vkxy-8vep-x7bg","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=885444fcbe10dc42787ecb76686c8ee4dd33bf33","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=885444fcbe10dc42787ecb76686c8ee4dd33bf33"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html"},{"reference_url":"https://access.redhat.com/errata/RHBA-2019:2824","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:2824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2594","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2594"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14813.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14813.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14813","reference_id":"","reference_type":"","scores":[{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92315","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92355","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92328","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92332","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92343","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92353","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92322","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14813"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/15","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/15"},{"reference_url":"https://www.debian.org/security/2019/dsa-4518","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4518"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743737","reference_id":"1743737","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743737"},{"reference_url":"https://security.archlinux.org/ASA-201911-5","reference_id":"ASA-201911-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-5"},{"reference_url":"https://security.archlinux.org/AVG-1031","reference_id":"AVG-1031","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1031"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14813","reference_id":"CVE-2019-14813","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14813"},{"reference_url":"https://security.gentoo.org/glsa/202004-03","reference_id":"GLSA-202004-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2534","reference_id":"RHSA-2019:2534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2586","reference_id":"RHSA-2019:2586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2591","reference_id":"RHSA-2019:2591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2591"},{"reference_url":"https://usn.ubuntu.com/4111-1/","reference_id":"USN-4111-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4111-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037127?format=json","purl":"pkg:deb/debian/ghostscript@9.26a~dfsg-0%2Bdeb9u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-2ypb-qhkv-1yfe"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-6zft-uqxb-pkh2"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8hfa-4qua-tuab"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gjj2-k1mt-sbgv"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kk8v-381v-sybr"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26a~dfsg-0%252Bdeb9u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2019-14813"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vkxy-8vep-x7bg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60668?format=json","vulnerability_id":"VCID-vw3z-bxb8-qkdq","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16301.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16301.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16301","reference_id":"","reference_type":"","scores":[{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74097","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74128","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.741","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74133","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74169","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74151","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74144","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870167","reference_id":"1870167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870167"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16301"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vw3z-bxb8-qkdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79849?format=json","vulnerability_id":"VCID-x6p8-v4bm-nqhs","summary":"ghostscript: heap-based buffer overflow in sampled_data_finish","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45949.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45949.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45949","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20214","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20363","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20423","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20147","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20287","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20315","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20269","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2021","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45944","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45944"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45949"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2048939","reference_id":"2048939","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2048939"},{"reference_url":"https://usn.ubuntu.com/5224-1/","reference_id":"USN-5224-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5224-1/"},{"reference_url":"https://usn.ubuntu.com/5224-2/","reference_id":"USN-5224-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5224-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2021-45949"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x6p8-v4bm-nqhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60656?format=json","vulnerability_id":"VCID-xg1d-bc8m-v7eg","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16289.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16289.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16289","reference_id":"","reference_type":"","scores":[{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.8059","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870244","reference_id":"1870244","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870244"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037838?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-2%2Bdeb10u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16fp-tdk6-sfcc"},{"vulnerability":"VCID-1xn6-drde-gkd4"},{"vulnerability":"VCID-2ncr-54s7-hqfz"},{"vulnerability":"VCID-3gax-xvqu-ykhh"},{"vulnerability":"VCID-3sxw-86yd-gqe1"},{"vulnerability":"VCID-479g-vu9e-1ygz"},{"vulnerability":"VCID-4eac-yk5k-mueh"},{"vulnerability":"VCID-4grr-m9cp-x3fm"},{"vulnerability":"VCID-4h4k-fmtp-j7bg"},{"vulnerability":"VCID-4zba-5tgb-nufd"},{"vulnerability":"VCID-79q2-phm8-e7cv"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7ap3-6gs2-fbgs"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wed-eqxt-pygs"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-95yj-ph8u-2fbq"},{"vulnerability":"VCID-ae31-n66y-akcg"},{"vulnerability":"VCID-b1zp-sfch-u3c1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-e8bh-th45-vfgg"},{"vulnerability":"VCID-eqhh-t7qd-vuav"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-fehm-g4fq-pfb2"},{"vulnerability":"VCID-ge8e-fm7t-gqgj"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-h7py-se4n-6bdy"},{"vulnerability":"VCID-hc8b-qzqp-pqdn"},{"vulnerability":"VCID-ht37-jj18-t3c5"},{"vulnerability":"VCID-hy2v-rkzm-nka1"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-kd8x-74zr-e7dd"},{"vulnerability":"VCID-kjpt-6dws-9ufd"},{"vulnerability":"VCID-kw3r-f2mb-cyf6"},{"vulnerability":"VCID-mg71-sbsj-2yam"},{"vulnerability":"VCID-mqgf-gbdy-4uav"},{"vulnerability":"VCID-mr6f-95kb-wfhf"},{"vulnerability":"VCID-n8rh-znkz-tfdt"},{"vulnerability":"VCID-nhtp-m11f-xuh6"},{"vulnerability":"VCID-nsan-3rne-7fbw"},{"vulnerability":"VCID-pjph-6muk-aff3"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-q9by-9s2x-z3au"},{"vulnerability":"VCID-qvq2-xbp6-m3fy"},{"vulnerability":"VCID-s9t8-smvb-wkd4"},{"vulnerability":"VCID-sj4u-xzg3-z3hf"},{"vulnerability":"VCID-snzm-pkb8-9fcp"},{"vulnerability":"VCID-thz5-yhwy-63fc"},{"vulnerability":"VCID-tp6u-sxuv-a3a6"},{"vulnerability":"VCID-trcm-319g-5qhu"},{"vulnerability":"VCID-ue85-9uqn-xye4"},{"vulnerability":"VCID-uryu-n1p2-mugy"},{"vulnerability":"VCID-vkxy-8vep-x7bg"},{"vulnerability":"VCID-vw3z-bxb8-qkdq"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-x5ce-v7bc-ufam"},{"vulnerability":"VCID-x6p8-v4bm-nqhs"},{"vulnerability":"VCID-xg1d-bc8m-v7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-2%252Bdeb10u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1026093?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-7anb-rnxg-97h8"},{"vulnerability":"VCID-7u9a-5pkt-4fbf"},{"vulnerability":"VCID-8wfs-knnp-8ub1"},{"vulnerability":"VCID-barv-t623-h3e5"},{"vulnerability":"VCID-bnpf-udu2-hqbk"},{"vulnerability":"VCID-c6ms-5wr2-kbfj"},{"vulnerability":"VCID-eypv-n5ea-abgn"},{"vulnerability":"VCID-gv9z-e7t9-m7g6"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k2rj-x3d7-ryd2"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-pnwf-fw4h-r3g3"},{"vulnerability":"VCID-pvfx-6ymq-6qbf"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wtv2-9jx7-kkgz"},{"vulnerability":"VCID-wzad-uxqp-63h3"},{"vulnerability":"VCID-x5ce-v7bc-ufam"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}],"aliases":["CVE-2020-16289"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xg1d-bc8m-v7eg"}],"risk_score":"3.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7"}