Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/571412?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/571412?format=api", "purl": "pkg:deb/debian/hplip@1.6.10-3etch1", "type": "deb", "namespace": "debian", "name": "hplip", "version": "1.6.10-3etch1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "3.21.2+dfsg1-2", "latest_non_vulnerable_version": "3.21.2+dfsg1-2", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34784?format=api", "vulnerability_id": "VCID-8e1n-19ca-ayb4", "summary": "A vulnerability in foomatic-filters could result in the execution\n of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2697.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2697.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2697", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90122", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90124", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90136", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90141", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90157", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90163", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90171", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.9017", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90165", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90183", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90182", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90179", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90193", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.9019", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90202", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90217", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05428", "scoring_system": "epss", "scoring_elements": "0.90228", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635549", "reference_id": "635549", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635549" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=721001", "reference_id": "721001", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=721001" }, { "reference_url": "https://security.gentoo.org/glsa/201203-07", "reference_id": "GLSA-201203-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201203-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1109", "reference_id": "RHSA-2011:1109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1109" }, { "reference_url": "https://usn.ubuntu.com/1194-1/", "reference_id": "USN-1194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1194-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571414?format=api", "purl": "pkg:deb/debian/hplip@3.10.6-2%2Bsqueeze2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ajy8-wz5n-mfb2" }, { "vulnerability": "VCID-e7ce-ncn2-87dd" }, { "vulnerability": "VCID-f2yg-yaaj-uub1" }, { "vulnerability": "VCID-f39n-wae1-n3cc" }, { "vulnerability": "VCID-k8hw-71wj-dygy" }, { "vulnerability": "VCID-m5z3-fsqw-nue1" }, { "vulnerability": "VCID-y2pa-cbhj-r7az" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.10.6-2%252Bsqueeze2" } ], "aliases": [ "CVE-2011-2697" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8e1n-19ca-ayb4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88386?format=api", "vulnerability_id": "VCID-a7h1-7a1g-vqa6", "summary": "hplip hpssd.py Denial-Of-Service parsing vulnerability", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2941.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2941.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2941", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1061", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10383", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10564", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10428", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10568", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10598", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10565", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10542", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10409", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10392", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10522", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10508", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10507", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10454", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10407", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10543", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2941", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2941" }, { "reference_url": "http://secunia.com/advisories/31470", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31470" }, { "reference_url": "http://secunia.com/advisories/31499", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31499" }, { "reference_url": "http://secunia.com/advisories/32316", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32316" }, { "reference_url": "http://secunia.com/advisories/32792", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32792" }, { "reference_url": "http://securitytracker.com/id?1020683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1020683" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44440" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10636" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:169", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:169" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0818.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0818.html" }, { "reference_url": "http://www.securityfocus.com/bid/30683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/30683" }, { "reference_url": "http://www.ubuntu.com/usn/USN-674-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-674-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-674-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-674-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=457052", "reference_id": "457052", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457052" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499842", "reference_id": "499842", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499842" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2941", "reference_id": "CVE-2008-2941", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2941" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0818", "reference_id": "RHSA-2008:0818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0818" }, { "reference_url": "https://usn.ubuntu.com/674-1/", "reference_id": "USN-674-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/674-1/" }, { "reference_url": "https://usn.ubuntu.com/674-2/", "reference_id": "USN-674-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/674-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571413?format=api", "purl": "pkg:deb/debian/hplip@2.8.6.b-4%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8e1n-19ca-ayb4" }, { "vulnerability": "VCID-ajy8-wz5n-mfb2" }, { "vulnerability": "VCID-e7ce-ncn2-87dd" }, { "vulnerability": "VCID-f2yg-yaaj-uub1" }, { "vulnerability": "VCID-f39n-wae1-n3cc" }, { "vulnerability": "VCID-k8hw-71wj-dygy" }, { "vulnerability": "VCID-m5z3-fsqw-nue1" }, { "vulnerability": "VCID-mfqk-y4g4-sfa5" }, { "vulnerability": "VCID-y2pa-cbhj-r7az" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@2.8.6.b-4%252Blenny1" } ], "aliases": [ "CVE-2008-2941" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a7h1-7a1g-vqa6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54453?format=api", "vulnerability_id": "VCID-ajy8-wz5n-mfb2", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6402.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6402.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6402", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1814", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18296", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1835", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18052", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18135", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1819", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18195", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18148", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18097", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18039", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18051", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18085", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17993", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17969", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17932", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17788", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1788", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17984", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1035243", "reference_id": "1035243", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1035243" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725876", "reference_id": "725876", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725876" }, { "reference_url": "https://usn.ubuntu.com/2085-1/", "reference_id": "USN-2085-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2085-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571415?format=api", "purl": "pkg:deb/debian/hplip@3.12.6-3.1%2Bdeb7u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ajy8-wz5n-mfb2" }, { "vulnerability": "VCID-e7ce-ncn2-87dd" }, { "vulnerability": "VCID-f39n-wae1-n3cc" }, { "vulnerability": "VCID-k8hw-71wj-dygy" }, { "vulnerability": "VCID-m5z3-fsqw-nue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.12.6-3.1%252Bdeb7u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050734?format=api", "purl": "pkg:deb/debian/hplip@3.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f39n-wae1-n3cc" }, { "vulnerability": "VCID-k8hw-71wj-dygy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.14.6-1" } ], "aliases": [ "CVE-2013-6402" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ajy8-wz5n-mfb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47336?format=api", "vulnerability_id": "VCID-cnxw-4ree-g3ez", "summary": "The hpssd daemon might allow local attackers to execute arbitrary commands\n with root privileges.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5208.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5208.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5208", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98802", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98805", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98809", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.9881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98812", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98813", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98814", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98818", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98819", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98822", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98825", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98826", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98829", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98831", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.73689", "scoring_system": "epss", "scoring_elements": "0.98834", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=319921", "reference_id": "319921", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=319921" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447341", "reference_id": "447341", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447341" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16837.rb", "reference_id": "CVE-2007-5208;OSVDB-41693", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16837.rb" }, { "reference_url": "https://security.gentoo.org/glsa/200710-26", "reference_id": "GLSA-200710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200710-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0960", "reference_id": "RHSA-2007:0960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0960" }, { "reference_url": "https://usn.ubuntu.com/530-1/", "reference_id": "USN-530-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/530-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571413?format=api", "purl": "pkg:deb/debian/hplip@2.8.6.b-4%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8e1n-19ca-ayb4" }, { "vulnerability": "VCID-ajy8-wz5n-mfb2" }, { "vulnerability": "VCID-e7ce-ncn2-87dd" }, { "vulnerability": "VCID-f2yg-yaaj-uub1" }, { "vulnerability": "VCID-f39n-wae1-n3cc" }, { "vulnerability": "VCID-k8hw-71wj-dygy" }, { "vulnerability": "VCID-m5z3-fsqw-nue1" }, { "vulnerability": "VCID-mfqk-y4g4-sfa5" }, { "vulnerability": "VCID-y2pa-cbhj-r7az" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@2.8.6.b-4%252Blenny1" } ], "aliases": [ "CVE-2007-5208" ], "risk_score": 1.4, "exploitability": "2.0", "weighted_severity": "0.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cnxw-4ree-g3ez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45765?format=api", "vulnerability_id": "VCID-e7ce-ncn2-87dd", "summary": "A race condition in polkit could allow a local attacker to gain\n escalated privileges.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4325.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4325.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4325", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20143", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20291", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20348", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20072", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20153", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20211", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20236", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20132", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20124", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20129", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20128", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20012", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20006", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19977", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19884", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19961", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20048", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006674", "reference_id": "1006674", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006674" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723716", "reference_id": "723716", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723716" }, { "reference_url": "https://security.gentoo.org/glsa/201406-27", "reference_id": "GLSA-201406-27", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1274", "reference_id": "RHSA-2013:1274", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1274" }, { "reference_url": "https://usn.ubuntu.com/1956-1/", "reference_id": "USN-1956-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1956-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571415?format=api", "purl": "pkg:deb/debian/hplip@3.12.6-3.1%2Bdeb7u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ajy8-wz5n-mfb2" }, { "vulnerability": "VCID-e7ce-ncn2-87dd" }, { "vulnerability": "VCID-f39n-wae1-n3cc" }, { "vulnerability": "VCID-k8hw-71wj-dygy" }, { "vulnerability": "VCID-m5z3-fsqw-nue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.12.6-3.1%252Bdeb7u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050734?format=api", "purl": "pkg:deb/debian/hplip@3.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f39n-wae1-n3cc" }, { "vulnerability": "VCID-k8hw-71wj-dygy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.14.6-1" } ], "aliases": [ "CVE-2013-4325" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e7ce-ncn2-87dd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49322?format=api", "vulnerability_id": "VCID-f2yg-yaaj-uub1", "summary": "Multiple vulnerabilities have been found in HPLIP, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2722.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2722.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2722", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21346", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21513", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21572", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21327", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21405", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21467", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21478", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21439", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21383", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21378", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21386", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21354", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21207", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21205", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21182", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21085", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21153", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21241", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2722" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635549", "reference_id": "635549", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635549" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=725830", "reference_id": "725830", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=725830" }, { "reference_url": "https://security.gentoo.org/glsa/201203-17", "reference_id": "GLSA-201203-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201203-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0133", "reference_id": "RHSA-2013:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0500", "reference_id": "RHSA-2013:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0500" }, { "reference_url": "https://usn.ubuntu.com/1981-1/", "reference_id": "USN-1981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1981-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571415?format=api", "purl": "pkg:deb/debian/hplip@3.12.6-3.1%2Bdeb7u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ajy8-wz5n-mfb2" }, { "vulnerability": "VCID-e7ce-ncn2-87dd" }, { "vulnerability": "VCID-f39n-wae1-n3cc" }, { "vulnerability": "VCID-k8hw-71wj-dygy" }, { "vulnerability": "VCID-m5z3-fsqw-nue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.12.6-3.1%252Bdeb7u1" } ], "aliases": [ "CVE-2011-2722" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f2yg-yaaj-uub1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85637?format=api", "vulnerability_id": "VCID-f39n-wae1-n3cc", "summary": "hplip: hp-plugin verified binary download with short key ID", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0839.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0839.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0839", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.50358", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.5035", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.50273", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.50326", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.5037", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.50424", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.50417", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.50458", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.50435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.5042", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.50463", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.50468", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.50444", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.5039", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00269", "scoring_system": "epss", "scoring_elements": "0.50399", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65788", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65818", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00496", "scoring_system": "epss", "scoring_elements": "0.65739", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0839" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0839", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0839" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227252", "reference_id": "1227252", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227252" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787353", "reference_id": "787353", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787353" }, { "reference_url": "https://usn.ubuntu.com/2699-1/", "reference_id": "USN-2699-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2699-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051427?format=api", "purl": "pkg:deb/debian/hplip@3.16.11%2Brepack0-1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-k8hw-71wj-dygy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.16.11%252Brepack0-1~bpo8%252B1" } ], "aliases": [ "CVE-2015-0839" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f39n-wae1-n3cc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88385?format=api", "vulnerability_id": "VCID-f3w3-w65v-hyhm", "summary": "hpssd of hplip allows unprivileged user to trigger alert mail", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2940.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2940.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2940", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13428", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13449", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13548", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13611", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13407", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13488", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13537", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1351", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13473", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13427", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13333", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13414", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13418", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13392", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13287", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13188", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13343", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2940" }, { "reference_url": "http://secunia.com/advisories/31470", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31470" }, { "reference_url": "http://secunia.com/advisories/31499", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31499" }, { "reference_url": "http://secunia.com/advisories/32316", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32316" }, { "reference_url": "http://secunia.com/advisories/32792", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32792" }, { "reference_url": "http://securitytracker.com/id?1020684", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1020684" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44441", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44441" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10136" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:169", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:169" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0818.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0818.html" }, { "reference_url": "http://www.securityfocus.com/bid/30683", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/30683" }, { "reference_url": "http://www.ubuntu.com/usn/USN-674-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-674-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-674-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-674-2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=455235", "reference_id": "455235", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455235" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499842", "reference_id": "499842", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499842" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2940", "reference_id": "CVE-2008-2940", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2940" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0818", "reference_id": "RHSA-2008:0818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0818" }, { "reference_url": "https://usn.ubuntu.com/674-1/", "reference_id": "USN-674-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/674-1/" }, { "reference_url": "https://usn.ubuntu.com/674-2/", "reference_id": "USN-674-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/674-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571413?format=api", "purl": "pkg:deb/debian/hplip@2.8.6.b-4%2Blenny1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8e1n-19ca-ayb4" }, { "vulnerability": "VCID-ajy8-wz5n-mfb2" }, { "vulnerability": "VCID-e7ce-ncn2-87dd" }, { "vulnerability": "VCID-f2yg-yaaj-uub1" }, { "vulnerability": "VCID-f39n-wae1-n3cc" }, { "vulnerability": "VCID-k8hw-71wj-dygy" }, { "vulnerability": "VCID-m5z3-fsqw-nue1" }, { "vulnerability": "VCID-mfqk-y4g4-sfa5" }, { "vulnerability": "VCID-y2pa-cbhj-r7az" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@2.8.6.b-4%252Blenny1" } ], "aliases": [ "CVE-2008-2940" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f3w3-w65v-hyhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94623?format=api", "vulnerability_id": "VCID-k8hw-71wj-dygy", "summary": "The HP Linux Imaging and Printing (HPLIP) software may potentially be affected by memory buffer overflow.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6923", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17974", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1778", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17872", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18129", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18286", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18337", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1804", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18123", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18179", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18186", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18138", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18089", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18032", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18044", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18078", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17987", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17964", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17927", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6923" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.hp.com/us-en/document/c06927115", "reference_id": "c06927115", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-20T16:45:04Z/" } ], "url": "https://support.hp.com/us-en/document/c06927115" }, { "reference_url": "https://usn.ubuntu.com/7202-1/", "reference_id": "USN-7202-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7202-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052335?format=api", "purl": "pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2" } ], "aliases": [ "CVE-2020-6923" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k8hw-71wj-dygy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54454?format=api", "vulnerability_id": "VCID-m5z3-fsqw-nue1", "summary": "several", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6427.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6427.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6427", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73636", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73645", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73669", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73642", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73677", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.7369", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73711", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73694", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73685", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73728", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73737", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73761", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.7377", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73763", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73789", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73813", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6427" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1038434", "reference_id": "1038434", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1038434" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731480", "reference_id": "731480", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731480" }, { "reference_url": "https://usn.ubuntu.com/2085-1/", "reference_id": "USN-2085-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2085-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571415?format=api", "purl": "pkg:deb/debian/hplip@3.12.6-3.1%2Bdeb7u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ajy8-wz5n-mfb2" }, { "vulnerability": "VCID-e7ce-ncn2-87dd" }, { "vulnerability": "VCID-f39n-wae1-n3cc" }, { "vulnerability": "VCID-k8hw-71wj-dygy" }, { "vulnerability": "VCID-m5z3-fsqw-nue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.12.6-3.1%252Bdeb7u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050734?format=api", "purl": "pkg:deb/debian/hplip@3.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f39n-wae1-n3cc" }, { "vulnerability": "VCID-k8hw-71wj-dygy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.14.6-1" } ], "aliases": [ "CVE-2013-6427" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m5z3-fsqw-nue1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49321?format=api", "vulnerability_id": "VCID-mfqk-y4g4-sfa5", "summary": "Multiple vulnerabilities have been found in HPLIP, the worst of\n which may allow execution of arbitrary code.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053472.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053472.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053474.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053474.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "reference_url": "http://osvdb.org/70498", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/70498" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4267.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4267.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4267", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.932", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.9311", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.93119", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.93123", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.93122", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.9313", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.93135", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.9314", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.93137", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.93139", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.93155", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.9316", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.93167", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.93173", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.93172", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.93169", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.93175", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.10217", "scoring_system": "epss", "scoring_elements": "0.9319", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4267" }, { "reference_url": "https://bugzilla.redhat.com/attachment.cgi?id=468455&action=diff", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/attachment.cgi?id=468455&action=diff" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267" }, { "reference_url": "http://secunia.com/advisories/42939", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42939" }, { "reference_url": "http://secunia.com/advisories/42956", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42956" }, { "reference_url": "http://secunia.com/advisories/43022", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43022" }, { "reference_url": "http://secunia.com/advisories/43068", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43068" }, { "reference_url": "http://secunia.com/advisories/43083", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43083" }, { "reference_url": "http://secunia.com/advisories/43102", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43102" }, { "reference_url": "http://secunia.com/advisories/48441", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48441" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201203-17.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201203-17.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64738" }, { "reference_url": "http://www.debian.org/security/2011/dsa-2152", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2011/dsa-2152" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:013", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:013" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0154.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0154.html" }, { "reference_url": "http://www.securityfocus.com/bid/45833", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45833" }, { "reference_url": "http://www.securitytracker.com/id?1024967", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1024967" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1051-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1051-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0136", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0136" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0160", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0160" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0211", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0211" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0212", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0212" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0228" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0243", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0243" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610960", "reference_id": "610960", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610960" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=662740", "reference_id": "662740", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=662740" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4267", "reference_id": "CVE-2010-4267", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4267" }, { "reference_url": "https://security.gentoo.org/glsa/201203-17", "reference_id": "GLSA-201203-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201203-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0154", "reference_id": "RHSA-2011:0154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0154" }, { "reference_url": "https://usn.ubuntu.com/1051-1/", "reference_id": "USN-1051-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1051-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571414?format=api", "purl": "pkg:deb/debian/hplip@3.10.6-2%2Bsqueeze2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ajy8-wz5n-mfb2" }, { "vulnerability": "VCID-e7ce-ncn2-87dd" }, { "vulnerability": "VCID-f2yg-yaaj-uub1" }, { "vulnerability": "VCID-f39n-wae1-n3cc" }, { "vulnerability": "VCID-k8hw-71wj-dygy" }, { "vulnerability": "VCID-m5z3-fsqw-nue1" }, { "vulnerability": "VCID-y2pa-cbhj-r7az" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.10.6-2%252Bsqueeze2" } ], "aliases": [ "CVE-2010-4267" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mfqk-y4g4-sfa5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54452?format=api", "vulnerability_id": "VCID-y2pa-cbhj-r7az", "summary": "several", "references": [ { "reference_url": "ftp://ftp.scientificlinux.org/linux/scientific/6x/SRPMS/vendor/hplip-3.12.4-4.el6.src.rpm", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.scientificlinux.org/linux/scientific/6x/SRPMS/vendor/hplip-3.12.4-4.el6.src.rpm" }, { "reference_url": "http://hplipopensource.com/hplip-web/release_notes.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://hplipopensource.com/hplip-web/release_notes.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0200.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0200.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0200", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22672", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22594", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22758", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22928", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22973", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22765", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2284", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22893", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22914", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22877", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22821", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22834", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22829", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22789", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22628", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2262", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22616", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22511", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427" }, { "reference_url": "http://secunia.com/advisories/55083", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/55083" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0072", "reference_id": "", "reference_type": "", "scores": [], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0072" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2829", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2829" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:088", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:088" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1981-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1981-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701185", "reference_id": "701185", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701185" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=902163", "reference_id": "902163", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=902163" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:2.7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:2.7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:2.7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0200", "reference_id": "CVE-2013-0200", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0500", "reference_id": "RHSA-2013:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0500" }, { "reference_url": "https://usn.ubuntu.com/1981-1/", "reference_id": "USN-1981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1981-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571415?format=api", "purl": "pkg:deb/debian/hplip@3.12.6-3.1%2Bdeb7u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ajy8-wz5n-mfb2" }, { "vulnerability": "VCID-e7ce-ncn2-87dd" }, { "vulnerability": "VCID-f39n-wae1-n3cc" }, { "vulnerability": "VCID-k8hw-71wj-dygy" }, { "vulnerability": "VCID-m5z3-fsqw-nue1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.12.6-3.1%252Bdeb7u1" } ], "aliases": [ "CVE-2013-0200" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y2pa-cbhj-r7az" } ], "fixing_vulnerabilities": [], "risk_score": "3.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@1.6.10-3etch1" }