{"url":"http://public2.vulnerablecode.io/api/packages/128552?format=json","purl":"pkg:rpm/redhat/ghostscript@7.07-33.2.el4_7?arch=8","type":"rpm","namespace":"redhat","name":"ghostscript","version":"7.07-33.2.el4_7","qualifiers":{"arch":"8"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88759?format=json","vulnerability_id":"VCID-42g4-nh4z-m7ev","summary":"ghostscript: DoS (crash) in CCITTFax decoding filter","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6725.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6725.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6725","reference_id":"","reference_type":"","scores":[{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90786","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90792","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90814","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90825","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90832","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90841","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.9084","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90838","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90862","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.9086","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90859","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90873","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90871","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90869","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90884","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90902","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6725"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=493442","reference_id":"493442","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=493442"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524803","reference_id":"524803","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524803"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0420","reference_id":"RHSA-2009:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0421","reference_id":"RHSA-2009:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0421"},{"reference_url":"https://usn.ubuntu.com/757-1/","reference_id":"USN-757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/757-1/"}],"fixed_packages":[],"aliases":["CVE-2007-6725"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-42g4-nh4z-m7ev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47316?format=json","vulnerability_id":"VCID-z1mg-r3dd-73gg","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0792.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0792.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0792","reference_id":"","reference_type":"","scores":[{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78637","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78643","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78654","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.7868","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78711","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78693","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78685","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78714","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78709","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78744","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78762","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78781","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78805","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=491853","reference_id":"491853","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=491853"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523472","reference_id":"523472","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523472"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524915","reference_id":"524915","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524915"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0420","reference_id":"RHSA-2009:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0421","reference_id":"RHSA-2009:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0421"},{"reference_url":"https://usn.ubuntu.com/757-1/","reference_id":"USN-757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/757-1/"}],"fixed_packages":[],"aliases":["CVE-2009-0792"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z1mg-r3dd-73gg"}],"fixing_vulnerabilities":[],"risk_score":"0.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ghostscript@7.07-33.2.el4_7%3Farch=8"}