{"url":"http://public2.vulnerablecode.io/api/packages/1037516?format=json","purl":"pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1","type":"deb","namespace":"debian","name":"cups-filters","version":"1.11.6-3+deb9u1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.28.17-3+deb12u2","latest_non_vulnerable_version":"1.28.17-3+deb12u2","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66476?format=json","vulnerability_id":"VCID-6qd1-jvb8-jqak","summary":"cups: cups-filters: cups-filters: Out-of-bounds write via crafted PDF MediaBox","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64503.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-64503","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06652","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06564","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06645","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06556","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09798","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09658","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09582","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09495","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09656","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09726","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09704","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09737","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09803","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14874","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14819","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14728","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14926","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14849","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-64503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64503"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120697","reference_id":"1120697","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120697"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120698","reference_id":"1120698","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120698"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414705","reference_id":"2414705","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414705"},{"reference_url":"https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865","reference_id":"50d94ca0f2fa6177613c97c59791bde568631865","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/"}],"url":"https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865"},{"reference_url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9","reference_id":"GHSA-893j-2wr2-wrh9","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/"}],"url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9"},{"reference_url":"https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620","reference_id":"pdftoraster.cxx#L1620","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/"}],"url":"https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620"},{"reference_url":"https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790","reference_id":"pdftoraster.cxx#L1790","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/"}],"url":"https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790"},{"reference_url":"https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880","reference_id":"pdftoraster.cxx#L1880","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/"}],"url":"https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8814","reference_id":"RHSA-2026:8814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8814"},{"reference_url":"https://usn.ubuntu.com/7877-1/","reference_id":"USN-7877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7877-1/"},{"reference_url":"https://usn.ubuntu.com/7878-1/","reference_id":"USN-7878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7878-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1055802?format=json","purl":"pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2"}],"aliases":["CVE-2025-64503"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6qd1-jvb8-jqak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66479?format=json","vulnerability_id":"VCID-7xq5-z572-xub3","summary":"cups: CUPS-Filters: Information disclosure and data corruption via crafted TIFF image file processing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57812.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57812.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-57812","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04222","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04165","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04094","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04123","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04102","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06654","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0636","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06387","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.064","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06417","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0654","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06607","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06619","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06631","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06655","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15589","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15447","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15646","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15579","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-57812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57812"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120703","reference_id":"1120703","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120703"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120704","reference_id":"1120704","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120704"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414632","reference_id":"2414632","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414632"},{"reference_url":"https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa","reference_id":"b69dfacec7f176281782e2f7ac44f04bf9633cfa","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/"}],"url":"https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa"},{"reference_url":"https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4","reference_id":"GHSA-jpxg-qc2c-hgv4","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/"}],"url":"https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4"},{"reference_url":"https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32","reference_id":"image-tiff.c#L32","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/"}],"url":"https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32"},{"reference_url":"https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34","reference_id":"image-tiff.c#L34","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/"}],"url":"https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34"},{"reference_url":"https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613","reference_id":"imagetoraster.c#L613","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/"}],"url":"https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8814","reference_id":"RHSA-2026:8814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8814"},{"reference_url":"https://usn.ubuntu.com/7877-1/","reference_id":"USN-7877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7877-1/"},{"reference_url":"https://usn.ubuntu.com/7878-1/","reference_id":"USN-7878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7878-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1055802?format=json","purl":"pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2"}],"aliases":["CVE-2025-57812"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7xq5-z572-xub3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73814?format=json","vulnerability_id":"VCID-f6n6-k5ye-3ugq","summary":"cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47076.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47076.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47076","reference_id":"","reference_type":"","scores":[{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.9885","published_at":"2026-05-15T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.98813","published_at":"2026-04-04T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.98816","published_at":"2026-04-07T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.98817","published_at":"2026-04-09T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.98819","published_at":"2026-04-11T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.9882","published_at":"2026-04-12T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.98821","published_at":"2026-04-13T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.98825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.98827","published_at":"2026-04-18T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.98834","published_at":"2026-04-29T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.98838","published_at":"2026-05-05T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.9884","published_at":"2026-05-07T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.98843","published_at":"2026-05-09T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.98845","published_at":"2026-05-11T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.98846","published_at":"2026-05-12T12:55:00Z"},{"value":"0.73875","scoring_system":"epss","scoring_elements":"0.98849","published_at":"2026-05-14T12:55:00Z"},{"value":"0.74242","scoring_system":"epss","scoring_elements":"0.98853","published_at":"2026-04-26T12:55:00Z"},{"value":"0.74242","scoring_system":"epss","scoring_elements":"0.98849","published_at":"2026-04-21T12:55:00Z"},{"value":"0.74242","scoring_system":"epss","scoring_elements":"0.9883","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082821","reference_id":"1082821","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082821"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082827","reference_id":"1082827","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082827"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314253","reference_id":"2314253","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314253"},{"reference_url":"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I","reference_id":"Attacking-UNIX-systems-via-CUPS-Part-I","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/"}],"url":"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I"},{"reference_url":"https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6","reference_id":"GHSA-7xfx-47qg-grp6","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/"}],"url":"https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6"},{"reference_url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47","reference_id":"GHSA-p9rh-jxmq-gq47","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/"}],"url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47"},{"reference_url":"https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8","reference_id":"GHSA-rj88-6mr5-rcw8","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/"}],"url":"https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8"},{"reference_url":"https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5","reference_id":"GHSA-w63j-6g73-wmg5","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/"}],"url":"https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7346","reference_id":"RHSA-2024:7346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7461","reference_id":"RHSA-2024:7461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7462","reference_id":"RHSA-2024:7462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7463","reference_id":"RHSA-2024:7463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7503","reference_id":"RHSA-2024:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7504","reference_id":"RHSA-2024:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7506","reference_id":"RHSA-2024:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7551","reference_id":"RHSA-2024:7551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7553","reference_id":"RHSA-2024:7553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7623","reference_id":"RHSA-2024:7623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7623"},{"reference_url":"https://usn.ubuntu.com/7043-1/","reference_id":"USN-7043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7043-1/"},{"reference_url":"https://usn.ubuntu.com/7043-4/","reference_id":"USN-7043-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7043-4/"},{"reference_url":"https://usn.ubuntu.com/7044-1/","reference_id":"USN-7044-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7044-1/"},{"reference_url":"https://www.cups.org","reference_id":"www.cups.org","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/"}],"url":"https://www.cups.org"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1055802?format=json","purl":"pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2"}],"aliases":["CVE-2024-47076"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f6n6-k5ye-3ugq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73813?format=json","vulnerability_id":"VCID-jvcy-2qyh-jqg4","summary":"cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47176.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47176.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47176","reference_id":"","reference_type":"","scores":[{"value":"0.87039","scoring_system":"epss","scoring_elements":"0.99434","published_at":"2026-04-02T12:55:00Z"},{"value":"0.87039","scoring_system":"epss","scoring_elements":"0.99443","published_at":"2026-04-21T12:55:00Z"},{"value":"0.87039","scoring_system":"epss","scoring_elements":"0.99445","published_at":"2026-04-26T12:55:00Z"},{"value":"0.87593","scoring_system":"epss","scoring_elements":"0.99463","published_at":"2026-04-11T12:55:00Z"},{"value":"0.87593","scoring_system":"epss","scoring_elements":"0.99458","published_at":"2026-04-04T12:55:00Z"},{"value":"0.87593","scoring_system":"epss","scoring_elements":"0.9946","published_at":"2026-04-07T12:55:00Z"},{"value":"0.87593","scoring_system":"epss","scoring_elements":"0.99461","published_at":"2026-04-08T12:55:00Z"},{"value":"0.87593","scoring_system":"epss","scoring_elements":"0.99462","published_at":"2026-04-09T12:55:00Z"},{"value":"0.87593","scoring_system":"epss","scoring_elements":"0.99464","published_at":"2026-04-13T12:55:00Z"},{"value":"0.87593","scoring_system":"epss","scoring_elements":"0.99473","published_at":"2026-05-11T12:55:00Z"},{"value":"0.87593","scoring_system":"epss","scoring_elements":"0.99472","published_at":"2026-05-07T12:55:00Z"},{"value":"0.87593","scoring_system":"epss","scoring_elements":"0.99471","published_at":"2026-05-09T12:55:00Z"},{"value":"0.87593","scoring_system":"epss","scoring_elements":"0.99475","published_at":"2026-05-15T12:55:00Z"},{"value":"0.87593","scoring_system":"epss","scoring_elements":"0.99474","published_at":"2026-05-14T12:55:00Z"},{"value":"0.87593","scoring_system":"epss","scoring_elements":"0.99468","published_at":"2026-04-18T12:55:00Z"},{"value":"0.87593","scoring_system":"epss","scoring_elements":"0.99467","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082820","reference_id":"1082820","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082820"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314252","reference_id":"2314252","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314252"},{"reference_url":"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I","reference_id":"Attacking-UNIX-systems-via-CUPS-Part-I","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"}],"url":"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I"},{"reference_url":"https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992","reference_id":"cups-browsed.c#L13992","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"}],"url":"https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992"},{"reference_url":"https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6","reference_id":"GHSA-7xfx-47qg-grp6","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"}],"url":"https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6"},{"reference_url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47","reference_id":"GHSA-p9rh-jxmq-gq47","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"}],"url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47"},{"reference_url":"https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8","reference_id":"GHSA-rj88-6mr5-rcw8","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"}],"url":"https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8"},{"reference_url":"https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5","reference_id":"GHSA-w63j-6g73-wmg5","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"}],"url":"https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7346","reference_id":"RHSA-2024:7346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7461","reference_id":"RHSA-2024:7461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7462","reference_id":"RHSA-2024:7462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7463","reference_id":"RHSA-2024:7463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7503","reference_id":"RHSA-2024:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7504","reference_id":"RHSA-2024:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7506","reference_id":"RHSA-2024:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7551","reference_id":"RHSA-2024:7551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7553","reference_id":"RHSA-2024:7553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7623","reference_id":"RHSA-2024:7623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7623"},{"reference_url":"https://usn.ubuntu.com/7042-1/","reference_id":"USN-7042-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7042-1/"},{"reference_url":"https://usn.ubuntu.com/7042-2/","reference_id":"USN-7042-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7042-2/"},{"reference_url":"https://usn.ubuntu.com/7042-3/","reference_id":"USN-7042-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7042-3/"},{"reference_url":"https://usn.ubuntu.com/7043-1/","reference_id":"USN-7043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7043-1/"},{"reference_url":"https://usn.ubuntu.com/7043-2/","reference_id":"USN-7043-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7043-2/"},{"reference_url":"https://usn.ubuntu.com/7043-3/","reference_id":"USN-7043-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7043-3/"},{"reference_url":"https://usn.ubuntu.com/7043-4/","reference_id":"USN-7043-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7043-4/"},{"reference_url":"https://www.cups.org","reference_id":"www.cups.org","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"}],"url":"https://www.cups.org"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1055802?format=json","purl":"pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2"}],"aliases":["CVE-2024-47176"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvcy-2qyh-jqg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66439?format=json","vulnerability_id":"VCID-rcep-az2v-1yab","summary":"cups-filters: cups-filters: Heap buffer overflow in rastertopclx filter may lead arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64524.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64524.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-64524","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06315","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06304","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06277","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06259","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06351","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07813","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07533","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07677","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07747","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0774","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07763","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07809","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09821","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09703","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09742","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09813","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09865","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09873","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09837","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09791","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09841","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-64524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64524"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414780","reference_id":"2414780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2414780"},{"reference_url":"https://github.com/OpenPrinting/cups-filters/commit/956283c74a34ae924266a2a63f8e5f529a1abd06","reference_id":"956283c74a34ae924266a2a63f8e5f529a1abd06","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-21T16:06:45Z/"}],"url":"https://github.com/OpenPrinting/cups-filters/commit/956283c74a34ae924266a2a63f8e5f529a1abd06"},{"reference_url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq44-2q5p-x3hv","reference_id":"GHSA-rq44-2q5p-x3hv","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-21T16:06:45Z/"}],"url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq44-2q5p-x3hv"},{"reference_url":"https://usn.ubuntu.com/7878-1/","reference_id":"USN-7878-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7878-1/"},{"reference_url":"https://usn.ubuntu.com/7878-2/","reference_id":"USN-7878-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7878-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1055802?format=json","purl":"pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2"}],"aliases":["CVE-2025-64524"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rcep-az2v-1yab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36000?format=json","vulnerability_id":"VCID-vzgv-8drt-8yd5","summary":"A vulnerability has been found in CUPS filters where remote code execution is possible via the beh filter.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24805.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24805.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-24805","reference_id":"","reference_type":"","scores":[{"value":"0.08929","scoring_system":"epss","scoring_elements":"0.92555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08929","scoring_system":"epss","scoring_elements":"0.92562","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08929","scoring_system":"epss","scoring_elements":"0.92564","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08929","scoring_system":"epss","scoring_elements":"0.92575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08929","scoring_system":"epss","scoring_elements":"0.9258","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08929","scoring_system":"epss","scoring_elements":"0.92586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08929","scoring_system":"epss","scoring_elements":"0.92587","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08929","scoring_system":"epss","scoring_elements":"0.92598","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08929","scoring_system":"epss","scoring_elements":"0.92599","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09527","scoring_system":"epss","scoring_elements":"0.92887","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09527","scoring_system":"epss","scoring_elements":"0.92901","published_at":"2026-05-11T12:55:00Z"},{"value":"0.09527","scoring_system":"epss","scoring_elements":"0.92908","published_at":"2026-05-12T12:55:00Z"},{"value":"0.09527","scoring_system":"epss","scoring_elements":"0.92868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09527","scoring_system":"epss","scoring_elements":"0.92864","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09527","scoring_system":"epss","scoring_elements":"0.92873","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09527","scoring_system":"epss","scoring_elements":"0.92897","published_at":"2026-05-09T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93177","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10242","scoring_system":"epss","scoring_elements":"0.93183","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10696","scoring_system":"epss","scoring_elements":"0.93398","published_at":"2026-05-14T12:55:00Z"},{"value":"0.10696","scoring_system":"epss","scoring_elements":"0.93405","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-24805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24805"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036224","reference_id":"1036224","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036224"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2203051","reference_id":"2203051","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2203051"},{"reference_url":"https://security.gentoo.org/glsa/202401-06","reference_id":"GLSA-202401-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3423","reference_id":"RHSA-2023:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3424","reference_id":"RHSA-2023:3424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3425","reference_id":"RHSA-2023:3425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3425"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3426","reference_id":"RHSA-2023:3426","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3427","reference_id":"RHSA-2023:3427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3428","reference_id":"RHSA-2023:3428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3429","reference_id":"RHSA-2023:3429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3429"},{"reference_url":"https://usn.ubuntu.com/6083-1/","reference_id":"USN-6083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6083-1/"},{"reference_url":"https://usn.ubuntu.com/6083-2/","reference_id":"USN-6083-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6083-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049457?format=json","purl":"pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6qd1-jvb8-jqak"},{"vulnerability":"VCID-7xq5-z572-xub3"},{"vulnerability":"VCID-f6n6-k5ye-3ugq"},{"vulnerability":"VCID-jvcy-2qyh-jqg4"},{"vulnerability":"VCID-rcep-az2v-1yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2"}],"aliases":["CVE-2023-24805"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vzgv-8drt-8yd5"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61902?format=json","vulnerability_id":"VCID-3317-h26p-43ef","summary":"security update","references":[{"reference_url":"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS","reference_id":"","reference_type":"","scores":[],"url":"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS"},{"reference_url":"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406","reference_id":"","reference_type":"","scores":[],"url":"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-01/msg00065.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-01/msg00065.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0491.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0491.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8327.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8327.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8327","reference_id":"","reference_type":"","scores":[{"value":"0.18149","scoring_system":"epss","scoring_elements":"0.95254","published_at":"2026-05-14T12:55:00Z"},{"value":"0.18149","scoring_system":"epss","scoring_elements":"0.95256","published_at":"2026-05-15T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95584","published_at":"2026-04-08T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95591","published_at":"2026-04-11T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95592","published_at":"2026-04-12T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.9556","published_at":"2026-04-01T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95607","published_at":"2026-04-21T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.9561","published_at":"2026-04-26T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95625","published_at":"2026-05-05T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95628","published_at":"2026-05-07T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95635","published_at":"2026-05-09T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95641","published_at":"2026-05-11T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95645","published_at":"2026-05-12T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95602","published_at":"2026-04-16T12:55:00Z"},{"value":"0.2071","scoring_system":"epss","scoring_elements":"0.95569","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8327"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806886","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-printing/2015/11/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-printing/2015/11/msg00020.html"},{"reference_url":"https://lists.debian.org/debian-printing/2015/12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-printing/2015/12/msg00001.html"},{"reference_url":"http://www.debian.org/security/2015/dsa-3411","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3411"},{"reference_url":"http://www.debian.org/security/2015/dsa-3429","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3429"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.securityfocus.com/bid/78524","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/78524"},{"reference_url":"http://www.ubuntu.com/usn/USN-2831-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2831-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2831-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2831-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287523","reference_id":"1287523","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287523"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8327","reference_id":"CVE-2015-8327","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0491","reference_id":"RHSA-2016:0491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0491"},{"reference_url":"https://usn.ubuntu.com/2831-1/","reference_id":"USN-2831-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2831-1/"},{"reference_url":"https://usn.ubuntu.com/2831-2/","reference_id":"USN-2831-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2831-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035666?format=json","purl":"pkg:deb/debian/cups-filters@1.0.61-5%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3317-h26p-43ef"},{"vulnerability":"VCID-39f1-22a5-c7aw"},{"vulnerability":"VCID-6qd1-jvb8-jqak"},{"vulnerability":"VCID-7xq5-z572-xub3"},{"vulnerability":"VCID-9dsn-96eh-bbh4"},{"vulnerability":"VCID-ed99-uccv-d7bh"},{"vulnerability":"VCID-f6n6-k5ye-3ugq"},{"vulnerability":"VCID-jvcy-2qyh-jqg4"},{"vulnerability":"VCID-rcep-az2v-1yab"},{"vulnerability":"VCID-uz2u-k3vm-w3c2"},{"vulnerability":"VCID-vzgv-8drt-8yd5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.61-5%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1037516?format=json","purl":"pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6qd1-jvb8-jqak"},{"vulnerability":"VCID-7xq5-z572-xub3"},{"vulnerability":"VCID-f6n6-k5ye-3ugq"},{"vulnerability":"VCID-jvcy-2qyh-jqg4"},{"vulnerability":"VCID-rcep-az2v-1yab"},{"vulnerability":"VCID-vzgv-8drt-8yd5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.11.6-3%252Bdeb9u1"}],"aliases":["CVE-2015-8327"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3317-h26p-43ef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48145?format=json","vulnerability_id":"VCID-39f1-22a5-c7aw","summary":"Multiple vulnerabilities have been found in cups-filters, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3258","reference_id":"","reference_type":"","scores":[{"value":"0.33515","scoring_system":"epss","scoring_elements":"0.96983","published_at":"2026-05-14T12:55:00Z"},{"value":"0.33515","scoring_system":"epss","scoring_elements":"0.96986","published_at":"2026-05-15T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97154","published_at":"2026-04-08T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97159","published_at":"2026-04-11T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.9716","published_at":"2026-04-12T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97161","published_at":"2026-04-13T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97169","published_at":"2026-04-16T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.9717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97131","published_at":"2026-04-01T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97176","published_at":"2026-04-26T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97178","published_at":"2026-04-29T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97183","published_at":"2026-05-05T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97187","published_at":"2026-05-07T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97197","published_at":"2026-05-11T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97202","published_at":"2026-05-12T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97174","published_at":"2026-04-21T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97138","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1235385","reference_id":"1235385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1235385"},{"reference_url":"https://security.gentoo.org/glsa/201510-08","reference_id":"GLSA-201510-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201510-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2360","reference_id":"RHSA-2015:2360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2360"},{"reference_url":"https://usn.ubuntu.com/2659-1/","reference_id":"USN-2659-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2659-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035666?format=json","purl":"pkg:deb/debian/cups-filters@1.0.61-5%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3317-h26p-43ef"},{"vulnerability":"VCID-39f1-22a5-c7aw"},{"vulnerability":"VCID-6qd1-jvb8-jqak"},{"vulnerability":"VCID-7xq5-z572-xub3"},{"vulnerability":"VCID-9dsn-96eh-bbh4"},{"vulnerability":"VCID-ed99-uccv-d7bh"},{"vulnerability":"VCID-f6n6-k5ye-3ugq"},{"vulnerability":"VCID-jvcy-2qyh-jqg4"},{"vulnerability":"VCID-rcep-az2v-1yab"},{"vulnerability":"VCID-uz2u-k3vm-w3c2"},{"vulnerability":"VCID-vzgv-8drt-8yd5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.61-5%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1037516?format=json","purl":"pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6qd1-jvb8-jqak"},{"vulnerability":"VCID-7xq5-z572-xub3"},{"vulnerability":"VCID-f6n6-k5ye-3ugq"},{"vulnerability":"VCID-jvcy-2qyh-jqg4"},{"vulnerability":"VCID-rcep-az2v-1yab"},{"vulnerability":"VCID-vzgv-8drt-8yd5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.11.6-3%252Bdeb9u1"}],"aliases":["CVE-2015-3258"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-39f1-22a5-c7aw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80230?format=json","vulnerability_id":"VCID-9dsn-96eh-bbh4","summary":"regression update","references":[],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037516?format=json","purl":"pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6qd1-jvb8-jqak"},{"vulnerability":"VCID-7xq5-z572-xub3"},{"vulnerability":"VCID-f6n6-k5ye-3ugq"},{"vulnerability":"VCID-jvcy-2qyh-jqg4"},{"vulnerability":"VCID-rcep-az2v-1yab"},{"vulnerability":"VCID-vzgv-8drt-8yd5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.11.6-3%252Bdeb9u1"}],"aliases":["DSA-4442-2 cups-filters"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9dsn-96eh-bbh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48146?format=json","vulnerability_id":"VCID-ed99-uccv-d7bh","summary":"Multiple vulnerabilities have been found in cups-filters, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3279","reference_id":"","reference_type":"","scores":[{"value":"0.31039","scoring_system":"epss","scoring_elements":"0.96793","published_at":"2026-05-14T12:55:00Z"},{"value":"0.31039","scoring_system":"epss","scoring_elements":"0.96796","published_at":"2026-05-15T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96979","published_at":"2026-04-04T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96981","published_at":"2026-04-07T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.9699","published_at":"2026-04-08T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96991","published_at":"2026-04-09T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96993","published_at":"2026-04-11T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96995","published_at":"2026-04-13T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97004","published_at":"2026-04-16T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97007","published_at":"2026-04-18T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96967","published_at":"2026-04-01T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97011","published_at":"2026-04-24T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97015","published_at":"2026-04-29T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97018","published_at":"2026-05-05T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97022","published_at":"2026-05-07T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97029","published_at":"2026-05-09T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97032","published_at":"2026-05-11T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97037","published_at":"2026-05-12T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.9701","published_at":"2026-04-21T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96975","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3279"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1238990","reference_id":"1238990","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1238990"},{"reference_url":"https://security.gentoo.org/glsa/201510-08","reference_id":"GLSA-201510-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201510-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2360","reference_id":"RHSA-2015:2360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2360"},{"reference_url":"https://usn.ubuntu.com/2659-1/","reference_id":"USN-2659-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2659-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035666?format=json","purl":"pkg:deb/debian/cups-filters@1.0.61-5%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3317-h26p-43ef"},{"vulnerability":"VCID-39f1-22a5-c7aw"},{"vulnerability":"VCID-6qd1-jvb8-jqak"},{"vulnerability":"VCID-7xq5-z572-xub3"},{"vulnerability":"VCID-9dsn-96eh-bbh4"},{"vulnerability":"VCID-ed99-uccv-d7bh"},{"vulnerability":"VCID-f6n6-k5ye-3ugq"},{"vulnerability":"VCID-jvcy-2qyh-jqg4"},{"vulnerability":"VCID-rcep-az2v-1yab"},{"vulnerability":"VCID-uz2u-k3vm-w3c2"},{"vulnerability":"VCID-vzgv-8drt-8yd5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.61-5%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1037516?format=json","purl":"pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6qd1-jvb8-jqak"},{"vulnerability":"VCID-7xq5-z572-xub3"},{"vulnerability":"VCID-f6n6-k5ye-3ugq"},{"vulnerability":"VCID-jvcy-2qyh-jqg4"},{"vulnerability":"VCID-rcep-az2v-1yab"},{"vulnerability":"VCID-vzgv-8drt-8yd5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.11.6-3%252Bdeb9u1"}],"aliases":["CVE-2015-3279"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ed99-uccv-d7bh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61903?format=json","vulnerability_id":"VCID-uz2u-k3vm-w3c2","summary":"security update","references":[{"reference_url":"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS","reference_id":"","reference_type":"","scores":[],"url":"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS"},{"reference_url":"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7419","reference_id":"","reference_type":"","scores":[],"url":"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7419"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0491.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0491.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8560.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8560.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8560","reference_id":"","reference_type":"","scores":[{"value":"0.09264","scoring_system":"epss","scoring_elements":"0.92824","published_at":"2026-05-15T12:55:00Z"},{"value":"0.09264","scoring_system":"epss","scoring_elements":"0.92818","published_at":"2026-05-14T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93328","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93344","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93362","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93314","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93374","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93378","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93375","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93373","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93381","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93393","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93403","published_at":"2026-05-11T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93409","published_at":"2026-05-12T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93367","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10778","scoring_system":"epss","scoring_elements":"0.93322","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8560"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560"},{"reference_url":"http://www.debian.org/security/2015/dsa-3419","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3419"},{"reference_url":"http://www.debian.org/security/2015/dsa-3429","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3429"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/12/13/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/12/13/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/12/14/13","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/12/14/13"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-2838-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2838-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2838-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2838-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291227","reference_id":"1291227","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291227"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807930","reference_id":"807930","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807930"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807993","reference_id":"807993","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807993"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:cups-filters:1.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8560","reference_id":"CVE-2015-8560","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0491","reference_id":"RHSA-2016:0491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0491"},{"reference_url":"https://usn.ubuntu.com/2838-1/","reference_id":"USN-2838-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2838-1/"},{"reference_url":"https://usn.ubuntu.com/2838-2/","reference_id":"USN-2838-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2838-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035666?format=json","purl":"pkg:deb/debian/cups-filters@1.0.61-5%2Bdeb8u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3317-h26p-43ef"},{"vulnerability":"VCID-39f1-22a5-c7aw"},{"vulnerability":"VCID-6qd1-jvb8-jqak"},{"vulnerability":"VCID-7xq5-z572-xub3"},{"vulnerability":"VCID-9dsn-96eh-bbh4"},{"vulnerability":"VCID-ed99-uccv-d7bh"},{"vulnerability":"VCID-f6n6-k5ye-3ugq"},{"vulnerability":"VCID-jvcy-2qyh-jqg4"},{"vulnerability":"VCID-rcep-az2v-1yab"},{"vulnerability":"VCID-uz2u-k3vm-w3c2"},{"vulnerability":"VCID-vzgv-8drt-8yd5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.61-5%252Bdeb8u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1037516?format=json","purl":"pkg:deb/debian/cups-filters@1.11.6-3%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6qd1-jvb8-jqak"},{"vulnerability":"VCID-7xq5-z572-xub3"},{"vulnerability":"VCID-f6n6-k5ye-3ugq"},{"vulnerability":"VCID-jvcy-2qyh-jqg4"},{"vulnerability":"VCID-rcep-az2v-1yab"},{"vulnerability":"VCID-vzgv-8drt-8yd5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.11.6-3%252Bdeb9u1"}],"aliases":["CVE-2015-8560"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uz2u-k3vm-w3c2"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.11.6-3%252Bdeb9u1"}