Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/571553?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "type": "deb", "namespace": "debian", "name": "cups", "version": "1.4.4-7+squeeze5", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.4.18-1", "latest_non_vulnerable_version": "2.4.18-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80613?format=api", "vulnerability_id": "VCID-2chf-23mc-d3dn", "summary": "cups: access to uninitialized buffer in ipp.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10001.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24831", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24951", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24726", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24793", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24838", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24852", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24813", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24756", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24767", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24759", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24736", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24675", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24663", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24618", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24495", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24573", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24637", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24564", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24581", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24661", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921680", "reference_id": "1921680", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921680" }, { "reference_url": "https://security.archlinux.org/ASA-202102-13", "reference_id": "ASA-202102-13", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-13" }, { "reference_url": "https://security.archlinux.org/AVG-1529", "reference_id": "AVG-1529", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1529" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4393", "reference_id": "RHSA-2021:4393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4393" }, { "reference_url": "https://usn.ubuntu.com/5454-1/", "reference_id": "USN-5454-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5454-1/" }, { "reference_url": "https://usn.ubuntu.com/5454-2/", "reference_id": "USN-5454-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5454-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2020-10001" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2chf-23mc-d3dn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57702?format=api", "vulnerability_id": "VCID-35gf-189e-3ud4", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0313.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15359", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15306", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15343", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15412", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15216", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15354", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15317", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15277", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15212", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15126", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15133", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15191", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1523", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15228", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15172", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15037", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15162", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15256", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1524", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15282", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5029" }, { "reference_url": "https://cups.org/str.php?L4455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cups.org/str.php?L4455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" }, { "reference_url": "http://secunia.com/advisories/60509", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60509" }, { "reference_url": "http://secunia.com/advisories/60787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60787" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2990", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2990" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2341-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2341-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122600", "reference_id": "1122600", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122600" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5029", "reference_id": "CVE-2014-5029", "reference_type": "", "scores": [ { "value": "1.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2341-1/", "reference_id": "USN-2341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2341-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-5029" ], "risk_score": 0.7, "exploitability": "0.5", "weighted_severity": "1.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35gf-189e-3ud4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48145?format=api", "vulnerability_id": "VCID-39f1-22a5-c7aw", "summary": "Multiple vulnerabilities have been found in cups-filters, the worst\n of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3258", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.33515", "scoring_system": "epss", "scoring_elements": "0.96983", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97138", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97144", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97154", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97159", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.9716", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97161", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97169", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97131", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97174", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97175", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97176", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97178", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97183", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97187", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97192", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97197", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97202", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.9717", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3258" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235385", "reference_id": "1235385", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235385" }, { "reference_url": "https://security.gentoo.org/glsa/201510-08", "reference_id": "GLSA-201510-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2360", "reference_id": "RHSA-2015:2360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2360" }, { "reference_url": "https://usn.ubuntu.com/2659-1/", "reference_id": "USN-2659-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2659-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2015-3258" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-39f1-22a5-c7aw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59620?format=api", "vulnerability_id": "VCID-3ame-feez-yqhc", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1158", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99181", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99183", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99188", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99189", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.9919", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99193", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99195", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99198", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.992", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99202", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99203", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99205", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221641", "reference_id": "1221641", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221641" }, { "reference_url": "https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py", "reference_id": "CVE-2015-1158", "reference_type": "exploit", "scores": [], "url": "https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py", "reference_id": "CVE-2015-1158", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py" }, { "reference_url": "http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html", "reference_id": "CVE-2015-1158;OSVDB-123116", "reference_type": "exploit", "scores": [], "url": "http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt", "reference_id": "CVE-2015-1158;OSVDB-123116", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201510-07", "reference_id": "GLSA-201510-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123", "reference_id": "RHSA-2015:1123", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1123" }, { "reference_url": "https://usn.ubuntu.com/2629-1/", "reference_id": "USN-2629-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2629-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036256?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037284?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1" } ], "aliases": [ "CVE-2015-1158" ], "risk_score": 1.4, "exploitability": "2.0", "weighted_severity": "0.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ame-feez-yqhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68013?format=api", "vulnerability_id": "VCID-3etj-2m21-ffa1", "summary": "cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58364.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58364.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58364", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.2918", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.30003", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31552", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32402", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32388", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32436", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32463", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32467", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32429", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32439", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32683", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32781", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32668", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32735", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32774", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32708", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32786", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32875", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32857", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393078", "reference_id": "2393078", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393078" }, { "reference_url": "https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d", "reference_id": "e58cba9d6fceed4242980e51dbd1302cf638ab1d", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-11T17:37:26Z/" } ], "url": "https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d" }, { "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4", "reference_id": "GHSA-7qx3-r744-6qv4", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-11T17:37:26Z/" } ], "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15700", "reference_id": "RHSA-2025:15700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15701", "reference_id": "RHSA-2025:15701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16590", "reference_id": "RHSA-2025:16590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16591", "reference_id": "RHSA-2025:16591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16592", "reference_id": "RHSA-2025:16592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22063", "reference_id": "RHSA-2025:22063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22063" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8814", "reference_id": "RHSA-2026:8814", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8814" }, { "reference_url": "https://usn.ubuntu.com/7745-1/", "reference_id": "USN-7745-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7745-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584494?format=api", "purl": "pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9" } ], "aliases": [ "CVE-2025-58364" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3etj-2m21-ffa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94280?format=api", "vulnerability_id": "VCID-44ju-8618-vqht", "summary": "A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8842", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57708", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57528", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57612", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57633", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57609", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57663", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57667", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57661", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57641", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57671", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57645", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57603", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57623", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57602", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57558", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57666", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57614", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://usn.ubuntu.com/5454-1/", "reference_id": "USN-5454-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5454-1/" }, { "reference_url": "https://usn.ubuntu.com/5454-2/", "reference_id": "USN-5454-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5454-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2019-8842" ], "risk_score": 0.7, "exploitability": "0.5", "weighted_severity": "1.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-44ju-8618-vqht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33707?format=api", "vulnerability_id": "VCID-48ht-j7ga-9ugq", "summary": "Multiple vulnerabilities have been found in CUPS, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3170.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3170.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3170", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92649", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92662", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92673", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92677", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92683", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92696", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.927", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92703", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92698", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92707", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92721", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92732", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92736", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92741", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92765", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3170" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=732106", "reference_id": "732106", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=732106" }, { "reference_url": "https://security.gentoo.org/glsa/201207-10", "reference_id": "GLSA-201207-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201207-10" }, { "reference_url": "https://usn.ubuntu.com/1207-1/", "reference_id": "USN-1207-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1207-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2011-3170" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-48ht-j7ga-9ugq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32182?format=api", "vulnerability_id": "VCID-4bxg-5tnm-y3hw", "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6476", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.5254", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52612", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52578", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52629", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52624", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52674", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52657", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52642", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.5268", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52671", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52622", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52632", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52595", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52537", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.5259", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52636", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52599", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53704", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6476" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318", "reference_id": "741318", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333", "reference_id": "741333", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333" }, { "reference_url": "https://security.gentoo.org/glsa/201406-16", "reference_id": "GLSA-201406-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-16" }, { "reference_url": "https://usn.ubuntu.com/2143-1/", "reference_id": "USN-2143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2143-1/" }, { "reference_url": "https://usn.ubuntu.com/2144-1/", "reference_id": "USN-2144-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2144-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2013-6476" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4bxg-5tnm-y3hw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82676?format=api", "vulnerability_id": "VCID-6mus-21kz-uuhz", "summary": "cups: Session cookie generated by the CUPS web interface is easy to guess", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4300.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4300.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4300", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59356", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59263", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59268", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.5925", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59231", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59251", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59238", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59195", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59243", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.593", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59258", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59284", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59226", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65554", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65662", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65668", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65602", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65632", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65598", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65649", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4300" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4300", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4300" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apple/cups/releases/tag/v2.2.10", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apple/cups/releases/tag/v2.2.10" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html" }, { "reference_url": "http://www.securityfocus.com/bid/107785", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107785" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695929", "reference_id": "1695929", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695929" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915909", "reference_id": "915909", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915909" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4300", "reference_id": "CVE-2018-4300", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4300" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1050", "reference_id": "RHSA-2020:1050", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1050" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2018-4300" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6mus-21kz-uuhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78840?format=api", "vulnerability_id": "VCID-7wg4-sc9v-bffk", "summary": "cups: Information leak through Cups-Get-Document operation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32360.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32360.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32360", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20097", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20154", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19884", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19963", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20037", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19992", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19917", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19921", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22605", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22571", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22548", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22539", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22537", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22443", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22526", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22586", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22663", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22709", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051953", "reference_id": "1051953", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051953" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230495", "reference_id": "2230495", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230495" }, { "reference_url": "https://support.apple.com/en-us/HT213758", "reference_id": "HT213758", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/" } ], "url": "https://support.apple.com/en-us/HT213758" }, { "reference_url": "https://support.apple.com/en-us/HT213759", "reference_id": "HT213759", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/" } ], "url": "https://support.apple.com/en-us/HT213759" }, { "reference_url": "https://support.apple.com/en-us/HT213760", "reference_id": "HT213760", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/" } ], "url": "https://support.apple.com/en-us/HT213760" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html", "reference_id": "msg00041.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4765", "reference_id": "RHSA-2023:4765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4766", "reference_id": "RHSA-2023:4766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4768", "reference_id": "RHSA-2023:4768", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4768" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4769", "reference_id": "RHSA-2023:4769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4770", "reference_id": "RHSA-2023:4770", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4770" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4771", "reference_id": "RHSA-2023:4771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4838", "reference_id": "RHSA-2023:4838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4864", "reference_id": "RHSA-2023:4864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4864" }, { "reference_url": "https://usn.ubuntu.com/6361-1/", "reference_id": "USN-6361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6361-1/" }, { "reference_url": "https://usn.ubuntu.com/6361-2/", "reference_id": "USN-6361-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6361-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2023-32360" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7wg4-sc9v-bffk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32179?format=api", "vulnerability_id": "VCID-843p-8xve-nfer", "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6474", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14176", "scoring_system": "epss", "scoring_elements": "0.94451", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95576", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95581", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95589", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95592", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95597", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95598", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.956", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95609", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95567", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95614", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95616", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95615", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95632", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95635", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95642", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95648", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95652", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95613", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6474" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318", "reference_id": "741318", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333", "reference_id": "741333", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333" }, { "reference_url": "https://security.gentoo.org/glsa/201406-16", "reference_id": "GLSA-201406-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-16" }, { "reference_url": "https://usn.ubuntu.com/2143-1/", "reference_id": "USN-2143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2143-1/" }, { "reference_url": "https://usn.ubuntu.com/2144-1/", "reference_id": "USN-2144-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2144-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2013-6474" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-843p-8xve-nfer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68012?format=api", "vulnerability_id": "VCID-993k-m3sq-gufu", "summary": "cups: Authentication Bypass in CUPS Authorization Handling", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58060.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58060.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58060", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15471", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15401", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16442", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16147", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16263", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1637", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16335", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16368", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16411", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16496", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16551", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16532", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16494", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16436", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16376", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16395", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16433", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16325", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16323", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16279", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58060" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392595", "reference_id": "2392595", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392595" }, { "reference_url": "https://github.com/OpenPrinting/cups/commit/595d691075b1d396d2edfaa0a8fd0873a0a1f221", "reference_id": "595d691075b1d396d2edfaa0a8fd0873a0a1f221", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-11T17:33:32Z/" } ], "url": "https://github.com/OpenPrinting/cups/commit/595d691075b1d396d2edfaa0a8fd0873a0a1f221" }, { "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq", "reference_id": "GHSA-4c68-qgrh-rmmq", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-11T17:33:32Z/" } ], "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15700", "reference_id": "RHSA-2025:15700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15701", "reference_id": "RHSA-2025:15701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15702", "reference_id": "RHSA-2025:15702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16590", "reference_id": "RHSA-2025:16590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16591", "reference_id": "RHSA-2025:16591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16592", "reference_id": "RHSA-2025:16592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17049", "reference_id": "RHSA-2025:17049", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17049" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17054", "reference_id": "RHSA-2025:17054", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17054" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17141", "reference_id": "RHSA-2025:17141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17144", "reference_id": "RHSA-2025:17144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17164", "reference_id": "RHSA-2025:17164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0934", "reference_id": "RHSA-2026:0934", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0934" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8814", "reference_id": "RHSA-2026:8814", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8814" }, { "reference_url": "https://usn.ubuntu.com/7745-1/", "reference_id": "USN-7745-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7745-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584494?format=api", "purl": "pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9" } ], "aliases": [ "CVE-2025-58060" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-993k-m3sq-gufu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73815?format=api", "vulnerability_id": "VCID-am36-6m5v-fkba", "summary": "cups: libppd: remote command injection via attacker controlled data in PPD file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47175.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47175.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47175", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96952", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96878", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96883", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96891", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96893", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96895", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96897", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96898", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96905", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96909", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96919", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96923", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96927", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96934", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96935", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96941", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.33659", "scoring_system": "epss", "scoring_elements": "0.96957", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.33659", "scoring_system": "epss", "scoring_elements": "0.96955", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.33659", "scoring_system": "epss", "scoring_elements": "0.96918", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256", "reference_id": "2314256", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "reference_url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I", "reference_id": "Attacking-UNIX-systems-via-CUPS-Part-I", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/" } ], "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I" }, { "reference_url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "reference_id": "GHSA-7xfx-47qg-grp6", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/" } ], "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "reference_url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47", "reference_id": "GHSA-p9rh-jxmq-gq47", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/" } ], "url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47" }, { "reference_url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "reference_id": "GHSA-rj88-6mr5-rcw8", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/" } ], "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "reference_url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5", "reference_id": "GHSA-w63j-6g73-wmg5", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/" } ], "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7346", "reference_id": "RHSA-2024:7346", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7346" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7461", "reference_id": "RHSA-2024:7461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7462", "reference_id": "RHSA-2024:7462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7463", "reference_id": "RHSA-2024:7463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7503", "reference_id": "RHSA-2024:7503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7504", "reference_id": "RHSA-2024:7504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7506", "reference_id": "RHSA-2024:7506", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7506" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7551", "reference_id": "RHSA-2024:7551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7553", "reference_id": "RHSA-2024:7553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7623", "reference_id": "RHSA-2024:7623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9470", "reference_id": "RHSA-2024:9470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0083", "reference_id": "RHSA-2025:0083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0083" }, { "reference_url": "https://usn.ubuntu.com/7041-1/", "reference_id": "USN-7041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7041-1/" }, { "reference_url": "https://usn.ubuntu.com/7041-2/", "reference_id": "USN-7041-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7041-2/" }, { "reference_url": "https://usn.ubuntu.com/7041-3/", "reference_id": "USN-7041-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7041-3/" }, { "reference_url": "https://usn.ubuntu.com/7045-1/", "reference_id": "USN-7045-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7045-1/" }, { "reference_url": "https://www.cups.org", "reference_id": "www.cups.org", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/" } ], "url": "https://www.cups.org" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584494?format=api", "purl": "pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9" } ], "aliases": [ "CVE-2024-47175" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-am36-6m5v-fkba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57701?format=api", "vulnerability_id": "VCID-anr5-gc12-e7dr", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0313.html" }, { "reference_url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16679", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16637", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16809", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16867", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16652", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16791", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16771", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16727", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1667", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16606", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16614", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16653", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16555", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16544", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16509", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16374", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16493", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16598", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16563", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16597", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" }, { "reference_url": "http://secunia.com/advisories/59945", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59945" }, { "reference_url": "http://secunia.com/advisories/60273", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60273" }, { "reference_url": "http://secunia.com/advisories/60787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60787" }, { "reference_url": "https://support.apple.com/kb/HT6535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT6535" }, { "reference_url": "http://www.cups.org/blog.php?L724", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cups.org/blog.php?L724" }, { "reference_url": "http://www.cups.org/str.php?L4450", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cups.org/str.php?L4450" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108" }, { "reference_url": "http://www.securityfocus.com/bid/68788", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68788" }, { "reference_url": "http://www.securitytracker.com/id/1030611", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030611" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2293-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2293-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115576", "reference_id": "1115576", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115576" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3537", "reference_id": "CVE-2014-3537", "reference_type": "", "scores": [ { "value": "1.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3537" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2293-1/", "reference_id": "USN-2293-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2293-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-3537" ], "risk_score": 0.6, "exploitability": "0.5", "weighted_severity": "1.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-anr5-gc12-e7dr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94174?format=api", "vulnerability_id": "VCID-apyh-1uza-pffa", "summary": "In array_find of array.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure in the printer spooler with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-111210196", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2228", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28106", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28179", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28222", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28017", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28084", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28128", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28134", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28091", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28033", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28043", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27978", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27895", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27783", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27707", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27536", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27597", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2762", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27538", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27554", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27631", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2228" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2228", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2228" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946782", "reference_id": "946782", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946782" }, { "reference_url": "https://usn.ubuntu.com/4340-1/", "reference_id": "USN-4340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4340-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2019-2228" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-apyh-1uza-pffa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31916?format=api", "vulnerability_id": "VCID-aznw-8yer-xfhf", "summary": "Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34241", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.0979", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09768", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09785", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09816", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09807", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09757", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09686", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10737", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11548", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11622", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11662", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11703", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1158", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1147", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17349", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17266", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17227", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17257", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17165", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/06/26/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/06/26/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/06/23/10", "reference_id": "10", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/06/23/10" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885", "reference_id": "1038885", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214914", "reference_id": "2214914", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214914" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/", "reference_id": "7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/" }, { "reference_url": "https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2", "reference_id": "9809947a959e18409dcf562a3466ef246cb90cb2", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2" }, { "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25", "reference_id": "GHSA-qjgh-5hcq-5f25", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-17", "reference_id": "GLSA-202402-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-17" }, { "reference_url": "https://support.apple.com/kb/HT213843", "reference_id": "HT213843", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://support.apple.com/kb/HT213843" }, { "reference_url": "https://support.apple.com/kb/HT213844", "reference_id": "HT213844", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://support.apple.com/kb/HT213844" }, { "reference_url": "https://support.apple.com/kb/HT213845", "reference_id": "HT213845", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://support.apple.com/kb/HT213845" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html", "reference_id": "msg00038.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6596", "reference_id": "RHSA-2023:6596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7165", "reference_id": "RHSA-2023:7165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1101", "reference_id": "RHSA-2024:1101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1409", "reference_id": "RHSA-2024:1409", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1409" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/", "reference_id": "TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/" }, { "reference_url": "https://usn.ubuntu.com/6184-1/", "reference_id": "USN-6184-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6184-1/" }, { "reference_url": "https://usn.ubuntu.com/6184-2/", "reference_id": "USN-6184-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6184-2/" }, { "reference_url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.6", "reference_id": "v2.4.6", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.6" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2023-34241" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aznw-8yer-xfhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34381?format=api", "vulnerability_id": "VCID-bzht-vhe3-y7bf", "summary": "Multiple vulnerabilities have been found in CUPS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29839", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30171", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30128", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30056", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29941", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29872", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29735", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29801", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29812", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29742", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29762", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30176", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3019", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40864", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.4095", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40957", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40939", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40946", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40975", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.409", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html" }, { "reference_url": "https://support.apple.com/HT208849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208849" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4243", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4243" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607282", "reference_id": "1607282", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607282" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4180", "reference_id": "CVE-2018-4180", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4180" }, { "reference_url": "https://security.gentoo.org/glsa/201908-08", "reference_id": "GLSA-201908-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1050", "reference_id": "RHSA-2020:1050", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1050" }, { "reference_url": "https://usn.ubuntu.com/3713-1/", "reference_id": "USN-3713-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3713-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037285?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2018-4180" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bzht-vhe3-y7bf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86391?format=api", "vulnerability_id": "VCID-cf81-58ju-bqaz", "summary": "cups: cross-site scripting flaw fixed in the 1.7.2 release", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2856.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2856.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2856", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77324", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77331", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77359", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.7734", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.7737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77379", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77406", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77385", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77382", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77422", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77414", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77448", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77456", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77467", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77475", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77502", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77525", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77514", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77533", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.7758", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087122", "reference_id": "1087122", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087122" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2172-1/", "reference_id": "USN-2172-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2172-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-2856" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cf81-58ju-bqaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48146?format=api", "vulnerability_id": "VCID-ed99-uccv-d7bh", "summary": "Multiple vulnerabilities have been found in cups-filters, the worst\n of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3279", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.31039", "scoring_system": "epss", "scoring_elements": "0.96793", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96975", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96979", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96981", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.9699", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96991", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96993", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96994", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96995", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97004", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96967", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.9701", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97011", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97015", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97018", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97022", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97029", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97032", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97037", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97007", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3279" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238990", "reference_id": "1238990", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238990" }, { "reference_url": "https://security.gentoo.org/glsa/201510-08", "reference_id": "GLSA-201510-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2360", "reference_id": "RHSA-2015:2360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2360" }, { "reference_url": "https://usn.ubuntu.com/2659-1/", "reference_id": "USN-2659-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2659-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2015-3279" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ed99-uccv-d7bh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81400?format=api", "vulnerability_id": "VCID-ev9c-v5dv-37fb", "summary": "cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3898.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3898.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3898", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37102", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37269", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37296", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37125", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37177", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3719", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37201", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37167", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37185", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37111", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36887", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36855", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36767", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36649", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36717", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36741", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36664", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36687", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36762", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1823964", "reference_id": "1823964", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1823964" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4469", "reference_id": "RHSA-2020:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4469" }, { "reference_url": "https://usn.ubuntu.com/4340-1/", "reference_id": "USN-4340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4340-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2020-3898" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ev9c-v5dv-37fb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57703?format=api", "vulnerability_id": "VCID-fby6-8f6z-63fw", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0313.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16197", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16109", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16292", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16354", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16153", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16239", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16304", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16286", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16247", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16116", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16134", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16172", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16061", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16059", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16021", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.15902", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16015", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16117", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16092", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16124", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5030" }, { "reference_url": "https://cups.org/str.php?L4455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cups.org/str.php?L4455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" }, { "reference_url": "http://secunia.com/advisories/60509", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60509" }, { "reference_url": "http://secunia.com/advisories/60787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60787" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2990", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2990" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2341-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2341-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128764", "reference_id": "1128764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128764" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5030", "reference_id": "CVE-2014-5030", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2341-1/", "reference_id": "USN-2341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2341-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-5030" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fby6-8f6z-63fw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83888?format=api", "vulnerability_id": "VCID-fkyp-m1p9-mfhy", "summary": "cups: Invalid usernames handled in scheduler/ipp.c:add_job() allow remote attackers to cause a denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18248.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18248.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18248", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.76945", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.76951", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.7698", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.76962", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.76994", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77006", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77034", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77012", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77009", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.7705", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77052", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77044", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77079", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77086", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.771", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77108", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77137", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77159", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77147", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77164", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77212", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18248" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561296", "reference_id": "1561296", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561296" }, { "reference_url": "https://usn.ubuntu.com/3713-1/", "reference_id": "USN-3713-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3713-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2017-18248" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fkyp-m1p9-mfhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75351?format=api", "vulnerability_id": "VCID-k4yw-jg6v-1bcc", "summary": "cups: Cupsd Listen arbitrary chmod 0140777", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35235.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35235.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35235", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86946", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86776", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86773", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86793", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86802", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86815", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86811", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86807", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86822", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86826", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86825", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86841", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86848", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86872", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.8689", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86908", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86904", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86917", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86756", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/11/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/06/11/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073002", "reference_id": "1073002", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073002" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2290318", "reference_id": "2290318", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2290318" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/12/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/06/12/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/12/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/06/12/5" }, { "reference_url": "https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d", "reference_id": "ff1f8a623e090dee8a8aadf12a6a4b25efac143d", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d" }, { "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f", "reference_id": "GHSA-vvwp-mv6j-hw6f", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f" }, { "reference_url": "https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240", "reference_id": "http-addr.c#L229-L240", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html", "reference_id": "msg00001.html", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4265", "reference_id": "RHSA-2024:4265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4580", "reference_id": "RHSA-2024:4580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4715", "reference_id": "RHSA-2024:4715", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4715" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4776", "reference_id": "RHSA-2024:4776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4776" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5644", "reference_id": "RHSA-2024:5644", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5644" }, { "reference_url": "https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21", "reference_id": "user-tmp#n21", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21" }, { "reference_url": "https://usn.ubuntu.com/6844-1/", "reference_id": "USN-6844-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6844-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2024-35235" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k4yw-jg6v-1bcc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32181?format=api", "vulnerability_id": "VCID-mcmb-bvw9-dba5", "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6475", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14107", "scoring_system": "epss", "scoring_elements": "0.94432", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95566", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95573", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.9558", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95583", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95588", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.9559", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95557", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95604", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95605", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95607", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95622", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95625", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95632", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95638", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95642", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95599", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550", "reference_id": "1027550", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318", "reference_id": "741318", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333", "reference_id": "741333", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333" }, { "reference_url": "https://security.gentoo.org/glsa/201406-16", "reference_id": "GLSA-201406-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-16" }, { "reference_url": "https://usn.ubuntu.com/2143-1/", "reference_id": "USN-2143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2143-1/" }, { "reference_url": "https://usn.ubuntu.com/2144-1/", "reference_id": "USN-2144-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2144-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2013-6475" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mcmb-bvw9-dba5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41478?format=api", "vulnerability_id": "VCID-mtzd-538p-kbhm", "summary": "A vulnerability in CUPS may allow for arbitrary file access.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0580.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0580.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5519.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5519.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5519", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93114", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93205", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93212", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93123", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93127", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93126", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93134", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93144", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93141", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93143", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93159", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93164", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93171", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93176", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93172", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93179", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93193", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93203", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.11376", "scoring_system": "epss", "scoring_elements": "0.93637", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80012" }, { "reference_url": "http://support.apple.com/kb/HT5784", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT5784" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/11/10/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/11/10/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/11/11/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/11/11/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/11/11/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/11/11/5" }, { "reference_url": "http://www.securityfocus.com/bid/56494", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/56494" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1654-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1654-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791", "reference_id": "692791", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=875898", "reference_id": "875898", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875898" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5519", "reference_id": "CVE-2012-5519", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5519" }, { "reference_url": "https://security.gentoo.org/glsa/201404-01", "reference_id": "GLSA-201404-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201404-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0580", "reference_id": "RHSA-2013:0580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0580" }, { "reference_url": "https://usn.ubuntu.com/1654-1/", "reference_id": "USN-1654-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1654-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2012-5519" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mtzd-538p-kbhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31913?format=api", "vulnerability_id": "VCID-p8gy-dd3u-uqh4", "summary": "Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26691", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09443", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09492", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10972", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10974", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10942", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10782", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10796", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10876", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10835", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10773", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10717", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10851", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10924", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10909", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10955", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11006", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10841", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10917", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c" }, { "reference_url": "https://support.apple.com/en-us/HT213183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/en-us/HT213183" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769", "reference_id": "1011769", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084321", "reference_id": "2084321", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084321" }, { "reference_url": "https://security.gentoo.org/glsa/202402-17", "reference_id": "GLSA-202402-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4990", "reference_id": "RHSA-2022:4990", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4990" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5054", "reference_id": "RHSA-2022:5054", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5054" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5055", "reference_id": "RHSA-2022:5055", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5055" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5056", "reference_id": "RHSA-2022:5056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5057", "reference_id": "RHSA-2022:5057", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5057" }, { "reference_url": "https://usn.ubuntu.com/5454-1/", "reference_id": "USN-5454-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5454-1/" }, { "reference_url": "https://usn.ubuntu.com/5454-2/", "reference_id": "USN-5454-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5454-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2022-26691", " MNDT-2022-0026" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p8gy-dd3u-uqh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83662?format=api", "vulnerability_id": "VCID-pwkd-sgtt-1bef", "summary": "cups: DNS rebinding attacks via incorrect whitelist", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18190.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18190.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18190", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71939", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71966", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71993", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72017", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72001", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71985", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72026", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72034", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72018", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72063", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.7207", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72056", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72088", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72115", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72079", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72105", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72163", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18190" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546395", "reference_id": "1546395", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3864", "reference_id": "RHSA-2020:3864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3864" }, { "reference_url": "https://usn.ubuntu.com/3577-1/", "reference_id": "USN-3577-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3577-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2017-18190" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pwkd-sgtt-1bef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31915?format=api", "vulnerability_id": "VCID-q8a8-fd7r-1kg7", "summary": "Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32324", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46866", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46887", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46883", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.4683", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46885", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46884", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46907", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.4688", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49182", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49159", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49186", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49261", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49235", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49244", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49202", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49119", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.4921", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49279", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49276", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49246", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209603", "reference_id": "2209603", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209603" }, { "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7", "reference_id": "GHSA-cxc6-w2g7-69p7", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/" } ], "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7" }, { "reference_url": "https://security.gentoo.org/glsa/202402-17", "reference_id": "GLSA-202402-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html", "reference_id": "msg00001.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6596", "reference_id": "RHSA-2023:6596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7165", "reference_id": "RHSA-2023:7165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1101", "reference_id": "RHSA-2024:1101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1409", "reference_id": "RHSA-2024:1409", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1409" }, { "reference_url": "https://usn.ubuntu.com/6128-1/", "reference_id": "USN-6128-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6128-1/" }, { "reference_url": "https://usn.ubuntu.com/6128-2/", "reference_id": "USN-6128-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6128-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2023-32324" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q8a8-fd7r-1kg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94170?format=api", "vulnerability_id": "VCID-qxwq-vp9g-ukca", "summary": "In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04058", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04028", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0383", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03868", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03878", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03892", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03897", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03922", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0389", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03871", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03845", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03824", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03833", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03953", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03967", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03971", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04015", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03973", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0399", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04025", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2180" }, { "reference_url": "https://source.android.com/security/bulletin/2019-09-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2019-09-01" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957", "reference_id": "934957", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2180", "reference_id": "CVE-2019-2180", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2180" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2019-2180" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qxwq-vp9g-ukca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59622?format=api", "vulnerability_id": "VCID-ucmb-we3r-aqcd", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1159", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98202", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98206", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.9821", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98211", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98216", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.9822", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98219", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98225", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98227", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98224", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98226", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98228", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98234", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98238", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98237", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221642", "reference_id": "1221642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221642" }, { "reference_url": "https://security.gentoo.org/glsa/201510-07", "reference_id": "GLSA-201510-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123", "reference_id": "RHSA-2015:1123", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1123" }, { "reference_url": "https://usn.ubuntu.com/2629-1/", "reference_id": "USN-2629-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2629-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036256?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037284?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1" } ], "aliases": [ "CVE-2015-1159" ], "risk_score": 0.2, "exploitability": "0.5", "weighted_severity": "0.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ucmb-we3r-aqcd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36514?format=api", "vulnerability_id": "VCID-ukec-69r2-xbef", "summary": "A buffer overflow in CUPS might allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9679", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05457", "scoring_system": "epss", "scoring_elements": "0.90272", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91682", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91696", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91709", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91715", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91719", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91721", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91717", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91673", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.9173", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91732", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91737", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91734", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91745", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91758", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91768", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91767", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91775", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91738", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191588", "reference_id": "1191588", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191588" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387", "reference_id": "778387", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387" }, { "reference_url": "https://security.gentoo.org/glsa/201607-06", "reference_id": "GLSA-201607-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123", "reference_id": "RHSA-2015:1123", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1123" }, { "reference_url": "https://usn.ubuntu.com/2520-1/", "reference_id": "USN-2520-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2520-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-9679" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ukec-69r2-xbef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31914?format=api", "vulnerability_id": "VCID-vx54-r2dt-8ue5", "summary": "Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4504", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10426", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10587", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1053", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1051", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10442", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10297", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10352", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10354", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10427", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10494", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1042", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10437", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10307", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10334", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10466", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10489", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10522", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10491", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4504" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238509", "reference_id": "2238509", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238509" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/", "reference_id": "5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/", "reference_id": "5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/", "reference_id": "AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/" }, { "reference_url": "https://takeonme.org/cves/CVE-2023-4504.html", "reference_id": "CVE-2023-4504.html", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://takeonme.org/cves/CVE-2023-4504.html" }, { "reference_url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6", "reference_id": "GHSA-4f65-6ph5-qwh6", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6" }, { "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h", "reference_id": "GHSA-pf5r-86w9-678h", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h" }, { "reference_url": "https://security.gentoo.org/glsa/202402-17", "reference_id": "GLSA-202402-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html", "reference_id": "msg00041.html", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/", "reference_id": "PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/", "reference_id": "T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/" }, { "reference_url": "https://usn.ubuntu.com/6391-1/", "reference_id": "USN-6391-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6391-1/" }, { "reference_url": "https://usn.ubuntu.com/6391-2/", "reference_id": "USN-6391-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6391-2/" }, { "reference_url": "https://usn.ubuntu.com/6392-1/", "reference_id": "USN-6392-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6392-1/" }, { "reference_url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.7", "reference_id": "v2.4.7", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.7" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2023-4504" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vx54-r2dt-8ue5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34382?format=api", "vulnerability_id": "VCID-w17y-dvuq-7ba6", "summary": "Multiple vulnerabilities have been found in CUPS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4181", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27543", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27959", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27942", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27893", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27807", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27695", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27621", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27448", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27508", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2753", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2745", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27466", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27951", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39331", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39501", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39512", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39474", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39517", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39431", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39486", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html" }, { "reference_url": "https://support.apple.com/HT208849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208849" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4243", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4243" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607291", "reference_id": "1607291", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607291" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4181", "reference_id": "CVE-2018-4181", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:N/A:N" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4181" }, { "reference_url": "https://security.gentoo.org/glsa/201908-08", "reference_id": "GLSA-201908-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1050", "reference_id": "RHSA-2020:1050", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1050" }, { "reference_url": "https://usn.ubuntu.com/3713-1/", "reference_id": "USN-3713-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3713-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037285?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2018-4181" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w17y-dvuq-7ba6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86418?format=api", "vulnerability_id": "VCID-wjht-u5u1-kkas", "summary": "cups: lppasswd vulnerability allows data access to unprivileged user", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6891.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6891.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6891", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1417", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14244", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14305", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14116", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14197", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14251", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14155", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13989", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14068", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14106", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14011", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13889", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14046", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14135", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14122", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14165", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1426", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6891" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6891", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6891" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051645", "reference_id": "1051645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051645" }, { "reference_url": "https://usn.ubuntu.com/2082-1/", "reference_id": "USN-2082-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2082-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2013-6891" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wjht-u5u1-kkas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82264?format=api", "vulnerability_id": "VCID-wqu4-wys6-hfbb", "summary": "cups: stack-buffer-overflow in libcups's asn1_get_type function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8675.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8675.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8675", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80524", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80553", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80545", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80574", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80584", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80601", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80579", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80607", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.8061", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80638", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80641", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80657", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80675", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80697", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80716", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80711", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80728", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80771", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8675" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738455", "reference_id": "1738455", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738455" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957", "reference_id": "934957", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1765", "reference_id": "RHSA-2020:1765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3864", "reference_id": "RHSA-2020:3864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3864" }, { "reference_url": "https://usn.ubuntu.com/4105-1/", "reference_id": "USN-4105-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4105-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2019-8675" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqu4-wys6-hfbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56772?format=api", "vulnerability_id": "VCID-y7a9-2p1n-z7fx", "summary": "Multiple vulnerabilities have been found in GIMP, the worst of\n which allow execution of arbitrary code or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2896.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2896.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2896", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.9157", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91584", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91606", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91612", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91616", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91618", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91615", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91637", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.9163", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91629", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91636", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91635", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91632", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91645", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91658", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91668", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91666", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91676", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91683", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2896" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643753", "reference_id": "643753", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643753" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=727800", "reference_id": "727800", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727800" }, { "reference_url": "https://security.gentoo.org/glsa/201209-23", "reference_id": "GLSA-201209-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1635", "reference_id": "RHSA-2011:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1635" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0302", "reference_id": "RHSA-2012:0302", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0302" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1180", "reference_id": "RHSA-2012:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1181", "reference_id": "RHSA-2012:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1181" }, { "reference_url": "https://usn.ubuntu.com/1207-1/", "reference_id": "USN-1207-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1207-1/" }, { "reference_url": "https://usn.ubuntu.com/1214-1/", "reference_id": "USN-1214-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1214-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2011-2896" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y7a9-2p1n-z7fx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57704?format=api", "vulnerability_id": "VCID-yyrd-qt22-w3f5", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0313.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.82006", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81742", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81752", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81775", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81772", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81799", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81805", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81825", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81812", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81807", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81844", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81845", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81847", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81871", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81881", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81886", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81904", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81924", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81949", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81947", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81964", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5031" }, { "reference_url": "https://cups.org/str.php?L4455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cups.org/str.php?L4455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" }, { "reference_url": "http://secunia.com/advisories/60509", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60509" }, { "reference_url": "http://secunia.com/advisories/60787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60787" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2990", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2990" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2341-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2341-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128767", "reference_id": "1128767", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128767" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5031", "reference_id": "CVE-2014-5031", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5031" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2341-1/", "reference_id": "USN-2341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2341-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-5031" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yyrd-qt22-w3f5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34380?format=api", "vulnerability_id": "VCID-zjj3-g2d7-c3gd", "summary": "Multiple vulnerabilities have been found in CUPS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15400", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.6126", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.6134", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61369", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61338", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61385", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61401", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61422", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61407", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61427", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61431", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61413", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61415", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61409", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61361", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61411", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.6147", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61432", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61459", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61512", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607288", "reference_id": "1607288", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607288" }, { "reference_url": "https://security.gentoo.org/glsa/201908-08", "reference_id": "GLSA-201908-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037285?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2017-15400" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zjj3-g2d7-c3gd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34386?format=api", "vulnerability_id": "VCID-zt43-htwu-kfde", "summary": "Multiple vulnerabilities have been found in CUPS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34985", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35183", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35093", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35137", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35163", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35133", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35145", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35131", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35082", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3485", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34833", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34743", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34615", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34688", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34725", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34628", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34653", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34721", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607285", "reference_id": "1607285", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607285" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605", "reference_id": "903605", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605" }, { "reference_url": "https://security.gentoo.org/glsa/201908-08", "reference_id": "GLSA-201908-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-08" }, { "reference_url": "https://usn.ubuntu.com/3713-1/", "reference_id": "USN-3713-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3713-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037285?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2018-6553" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zt43-htwu-kfde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82265?format=api", "vulnerability_id": "VCID-zxp7-6d69-tfhm", "summary": "cups: stack-buffer-overflow in libcups's asn1_get_packed function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8696.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8696.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8696", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80524", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80553", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80545", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80574", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80584", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80601", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80579", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80607", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.8061", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80638", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80641", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80657", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80675", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80697", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80716", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80711", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80728", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80771", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738497", "reference_id": "1738497", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738497" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957", "reference_id": "934957", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1765", "reference_id": "RHSA-2020:1765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3864", "reference_id": "RHSA-2020:3864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3864" }, { "reference_url": "https://usn.ubuntu.com/4105-1/", "reference_id": "USN-4105-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4105-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2019-8696" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zxp7-6d69-tfhm" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33698?format=api", "vulnerability_id": "VCID-2weh-q66p-8bdg", "summary": "Multiple vulnerabilities have been found in CUPS, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0302.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0302.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0302", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.8997", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.89973", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.89985", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.8999", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.90006", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.90012", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.9002", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.90018", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.90028", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.90029", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.90026", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.90044", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.90043", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.90055", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.9007", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.90082", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.90079", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.90087", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0529", "scoring_system": "epss", "scoring_elements": "0.90101", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0302" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0302", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0302" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=557775", "reference_id": "557775", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=557775" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572940", "reference_id": "572940", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572940" }, { "reference_url": "https://security.gentoo.org/glsa/201207-10", "reference_id": "GLSA-201207-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201207-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0129", "reference_id": "RHSA-2010:0129", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0129" }, { "reference_url": "https://usn.ubuntu.com/906-1/", "reference_id": "USN-906-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/906-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2010-0302" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2weh-q66p-8bdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60450?format=api", "vulnerability_id": "VCID-4he8-q3nc-3bf7", "summary": "Multiple errors in CUPS might allow for the remote execution of arbitrary\n code or DNS rebinding attacks.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0163.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0163.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0163", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89611", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89614", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89628", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89629", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89645", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89656", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.8965", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89665", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89666", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.8966", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89676", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89678", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89677", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89689", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89706", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89718", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89713", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89723", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89742", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490596", "reference_id": "490596", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490596" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0428", "reference_id": "RHSA-2009:0428", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0428" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://usn.ubuntu.com/760-1/", "reference_id": "USN-760-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/760-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2009-0163" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4he8-q3nc-3bf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33700?format=api", "vulnerability_id": "VCID-7gbc-682w-5fdq", "summary": "Multiple vulnerabilities have been found in CUPS, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://cups.org/articles.php?L596", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cups.org/articles.php?L596" }, { "reference_url": "http://cups.org/str.php?L3498", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cups.org/str.php?L3498" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0540.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0540.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0540", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60894", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60643", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60717", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60747", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60713", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60761", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60798", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60784", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60765", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60807", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60813", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60786", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60799", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60792", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60743", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.6079", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60848", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60809", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60836", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0540" }, { "reference_url": "http://secunia.com/advisories/40220", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40220" }, { "reference_url": "http://secunia.com/advisories/43521", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43521" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201207-10.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201207-10.xml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10382" }, { "reference_url": "http://support.apple.com/kb/HT4188", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4188" }, { "reference_url": "http://www.debian.org/security/2011/dsa-2176", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2011/dsa-2176" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:233", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:233" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234" }, { "reference_url": "http://www.securityfocus.com/bid/40871", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40871" }, { "reference_url": "http://www.securitytracker.com/id?1024122", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1024122" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1481", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1481" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0535" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=588805", "reference_id": "588805", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=588805" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0540", "reference_id": "CVE-2010-0540", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0540" }, { "reference_url": "https://security.gentoo.org/glsa/201207-10", "reference_id": "GLSA-201207-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201207-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0490", "reference_id": "RHSA-2010:0490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0490" }, { "reference_url": "https://usn.ubuntu.com/952-1/", "reference_id": "USN-952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2010-0540" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7gbc-682w-5fdq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88298?format=api", "vulnerability_id": "VCID-8yv6-g189-vugt", "summary": "cups: DoS (daemon crash) caused by the large number of subscriptions", "references": [ { "reference_url": "http://lab.gnucitizen.org/projects/cups-0day", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lab.gnucitizen.org/projects/cups-0day" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5183.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5183.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5183", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89391", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89371", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89242", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89248", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89263", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89265", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89283", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89287", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89296", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89293", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.8929", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89303", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89302", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89297", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89315", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89319", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89323", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89331", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89349", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.89362", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04639", "scoring_system": "epss", "scoring_elements": "0.8936", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5183" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/+source/cups/+bug/298241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/+source/cups/+bug/298241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5183" }, { "reference_url": "http://secunia.com/advisories/33937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33937" }, { "reference_url": "http://secunia.com/advisories/43521", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43521" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46684" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10586" }, { "reference_url": "http://support.apple.com/kb/HT3438", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3438" }, { "reference_url": "https://www.exploit-db.com/exploits/7150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/7150" }, { "reference_url": "http://www.debian.org/security/2011/dsa-2176", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2011/dsa-2176" }, { "reference_url": "http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:028" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/11/19/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/11/19/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/11/19/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/11/19/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/11/20/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/11/20/1" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-1029.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-1029.html" }, { "reference_url": "http://www.securityfocus.com/bid/32419", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32419" }, { "reference_url": "http://www.securitytracker.com/id?1021396", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021396" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0422", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0422" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0535" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=473901", "reference_id": "473901", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473901" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506180", "reference_id": "506180", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506180" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5183", "reference_id": "CVE-2008-5183", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5183" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/7150.html", "reference_id": "OSVDB-50351;CVE-2008-5183", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/7150.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:1029", "reference_id": "RHSA-2008:1029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:1029" }, { "reference_url": "https://usn.ubuntu.com/707-1/", "reference_id": "USN-707-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/707-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2008-5183" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8yv6-g189-vugt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33701?format=api", "vulnerability_id": "VCID-bj8b-t1mc-zfd3", "summary": "Multiple vulnerabilities have been found in CUPS, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://cups.org/articles.php?L596", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cups.org/articles.php?L596" }, { "reference_url": "http://cups.org/strfiles/3516/str3516.patch", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cups.org/strfiles/3516/str3516.patch" }, { "reference_url": "http://cups.org/str.php?L3516", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cups.org/str.php?L3516" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0542.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0542.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0542", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89112", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.88967", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.88975", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.88994", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89012", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89029", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89024", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89022", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89036", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89034", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89046", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89054", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89057", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89064", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.8908", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89091", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89086", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04413", "scoring_system": "epss", "scoring_elements": "0.89096", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542" }, { "reference_url": "http://secunia.com/advisories/43521", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43521" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201207-10.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201207-10.xml" }, { "reference_url": "http://securitytracker.com/id?1024121", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024121" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10365" }, { "reference_url": "http://www.debian.org/security/2011/dsa-2176", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2011/dsa-2176" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234" }, { "reference_url": "http://www.securityfocus.com/bid/40943", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40943" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0535" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=587746", "reference_id": "587746", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=587746" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0542", "reference_id": "CVE-2010-0542", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0542" }, { "reference_url": "https://security.gentoo.org/glsa/201207-10", "reference_id": "GLSA-201207-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201207-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0490", "reference_id": "RHSA-2010:0490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0490" }, { "reference_url": "https://usn.ubuntu.com/952-1/", "reference_id": "USN-952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2010-0542" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bj8b-t1mc-zfd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33704?format=api", "vulnerability_id": "VCID-fpbv-zqer-w7c3", "summary": "Multiple vulnerabilities have been found in CUPS, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://cups.org/articles.php?L596", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cups.org/articles.php?L596" }, { "reference_url": "http://cups.org/str.php?L3510", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cups.org/str.php?L3510" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2010-0811.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2010-0811.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2431.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2431.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2431", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08536", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08531", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08428", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0847", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08526", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08443", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08517", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18517", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18475", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18348", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18433", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18535", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18497", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.1853", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18667", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18614", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18626", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18645", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18537", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2431" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2431", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2431" }, { "reference_url": "http://secunia.com/advisories/43521", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43521" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201207-10.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201207-10.xml" }, { "reference_url": "http://www.debian.org/security/2011/dsa-2176", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2011/dsa-2176" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2856" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0535" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=605397", "reference_id": "605397", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605397" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2431", "reference_id": "CVE-2010-2431", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:N/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2431" }, { "reference_url": "https://security.gentoo.org/glsa/201207-10", "reference_id": "GLSA-201207-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201207-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0811", "reference_id": "RHSA-2010:0811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0811" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2010-2431" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fpbv-zqer-w7c3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33699?format=api", "vulnerability_id": "VCID-g2x8-pm39-sfer", "summary": "Multiple vulnerabilities have been found in CUPS, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0393.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0393.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0393", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23747", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23863", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23692", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23763", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.2381", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23824", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.2378", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23723", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23734", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23722", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23698", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23587", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23577", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23542", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23424", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23503", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23571", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23523", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23543", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23628", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0393" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=558460", "reference_id": "558460", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558460" }, { "reference_url": "https://security.gentoo.org/glsa/201207-10", "reference_id": "GLSA-201207-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201207-10" }, { "reference_url": "https://usn.ubuntu.com/906-1/", "reference_id": "USN-906-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/906-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2010-0393" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g2x8-pm39-sfer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33697?format=api", "vulnerability_id": "VCID-mp2s-4x2a-h7fq", "summary": "Multiple vulnerabilities have been found in CUPS, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3553.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3553.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.92953", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.92962", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.92966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.92974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.92978", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.92983", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.92981", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.92982", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.92992", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.92994", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.93002", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.93007", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.93003", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.93008", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.93024", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.93035", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.93038", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.93045", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.09847", "scoring_system": "epss", "scoring_elements": "0.93067", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=530111", "reference_id": "530111", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530111" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=557740", "reference_id": "557740", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=557740" }, { "reference_url": "https://security.gentoo.org/glsa/201207-10", "reference_id": "GLSA-201207-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201207-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1595", "reference_id": "RHSA-2009:1595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1595" }, { "reference_url": "https://usn.ubuntu.com/906-1/", "reference_id": "USN-906-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/906-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2009-3553" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mp2s-4x2a-h7fq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88145?format=api", "vulnerability_id": "VCID-mtwe-dgnd-c3fj", "summary": "cups: IPP_TAG_UNSUPPORTED handling NULL pointer dereference DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0949.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0949.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0949", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20572", "scoring_system": "epss", "scoring_elements": "0.9554", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20572", "scoring_system": "epss", "scoring_elements": "0.95549", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20572", "scoring_system": "epss", "scoring_elements": "0.95554", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20572", "scoring_system": "epss", "scoring_elements": "0.95558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20572", "scoring_system": "epss", "scoring_elements": "0.95565", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20572", "scoring_system": "epss", "scoring_elements": "0.95568", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20572", "scoring_system": "epss", "scoring_elements": "0.95572", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.20572", "scoring_system": "epss", "scoring_elements": "0.95573", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20572", "scoring_system": "epss", "scoring_elements": "0.95574", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20572", "scoring_system": "epss", "scoring_elements": "0.95582", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.22431", "scoring_system": "epss", "scoring_elements": "0.95846", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.22431", "scoring_system": "epss", "scoring_elements": "0.95849", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.22431", "scoring_system": "epss", "scoring_elements": "0.95852", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.22431", "scoring_system": "epss", "scoring_elements": "0.95851", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.22431", "scoring_system": "epss", "scoring_elements": "0.95864", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.22431", "scoring_system": "epss", "scoring_elements": "0.95866", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.22431", "scoring_system": "epss", "scoring_elements": "0.95872", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.22431", "scoring_system": "epss", "scoring_elements": "0.95875", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.22431", "scoring_system": "epss", "scoring_elements": "0.9588", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.22431", "scoring_system": "epss", "scoring_elements": "0.95893", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0949" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972", "reference_id": "500972", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500972" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33020.py", "reference_id": "CVE-2009-0949;OSVDB-55002", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33020.py" }, { "reference_url": "https://www.securityfocus.com/bid/35169/info", "reference_id": "CVE-2009-0949;OSVDB-55002", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/35169/info" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1082", "reference_id": "RHSA-2009:1082", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1082" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1083", "reference_id": "RHSA-2009:1083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1083" }, { "reference_url": "https://usn.ubuntu.com/780-1/", "reference_id": "USN-780-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/780-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2009-0949" ], "risk_score": 0.4, "exploitability": "2.0", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mtwe-dgnd-c3fj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88152?format=api", "vulnerability_id": "VCID-qjzr-avt1-fyfd", "summary": "xpdf: multiple integer overflows", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0791.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0791.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0791", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.8969", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89708", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.8971", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89727", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89734", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89741", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89739", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89732", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89749", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89744", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89758", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.8976", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89759", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89772", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89786", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89797", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89792", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89801", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.05022", "scoring_system": "epss", "scoring_elements": "0.89819", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0791" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=491840", "reference_id": "491840", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491840" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535489", "reference_id": "535489", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1083", "reference_id": "RHSA-2009:1083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1500", "reference_id": "RHSA-2009:1500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1501", "reference_id": "RHSA-2009:1501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1502", "reference_id": "RHSA-2009:1502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1503", "reference_id": "RHSA-2009:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1512", "reference_id": "RHSA-2009:1512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0401", "reference_id": "RHSA-2010:0401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0401" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2009-0791" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qjzr-avt1-fyfd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33702?format=api", "vulnerability_id": "VCID-uqp7-5pb9-w7cg", "summary": "Multiple vulnerabilities have been found in CUPS, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://cups.org/articles.php?L596", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cups.org/articles.php?L596" }, { "reference_url": "http://cups.org/str.php?L3577", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cups.org/str.php?L3577" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1748.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1748.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1748", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93974", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93853", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93862", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93871", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93874", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93883", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93886", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.9389", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93891", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93912", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93917", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93919", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.9392", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93918", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93927", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93939", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.9395", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93955", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.12394", "scoring_system": "epss", "scoring_elements": "0.93959", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748" }, { "reference_url": "http://secunia.com/advisories/40220", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40220" }, { "reference_url": "http://secunia.com/advisories/43521", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43521" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201207-10.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201207-10.xml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9723", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9723" }, { "reference_url": "http://support.apple.com/kb/HT4188", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4188" }, { "reference_url": "http://www.debian.org/security/2011/dsa-2176", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2011/dsa-2176" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234" }, { "reference_url": "http://www.securityfocus.com/bid/40871", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40871" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1481", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1481" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0535" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=591983", "reference_id": "591983", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=591983" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1748", "reference_id": "CVE-2010-1748", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1748" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34152.txt", "reference_id": "CVE-2010-1748;OSVDB-65569", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34152.txt" }, { "reference_url": "https://www.securityfocus.com/bid/40897/info", "reference_id": "CVE-2010-1748;OSVDB-65569", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/40897/info" }, { "reference_url": "https://security.gentoo.org/glsa/201207-10", "reference_id": "GLSA-201207-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201207-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0490", "reference_id": "RHSA-2010:0490", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0490" }, { "reference_url": "https://usn.ubuntu.com/952-1/", "reference_id": "USN-952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/952-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2010-1748" ], "risk_score": 7.8, "exploitability": "2.0", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uqp7-5pb9-w7cg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33705?format=api", "vulnerability_id": "VCID-ur43-jbhj-k7bk", "summary": "Multiple vulnerabilities have been found in CUPS, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://cups.org/articles.php?L596", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cups.org/articles.php?L596" }, { "reference_url": "http://cups.org/str.php?L3518", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cups.org/str.php?L3518" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2432.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2432.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2432", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74545", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74471", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74475", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74501", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74476", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74508", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00829", "scoring_system": "epss", "scoring_elements": "0.74523", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.75829", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.7584", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.75848", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.75878", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.75902", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.75887", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.75901", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.75952", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.75763", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.75757", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.75795", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.75798", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.75784", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00907", "scoring_system": "epss", "scoring_elements": "0.75823", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2432" }, { "reference_url": "http://secunia.com/advisories/43521", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43521" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201207-10.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201207-10.xml" }, { "reference_url": "http://www.debian.org/security/2011/dsa-2176", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2011/dsa-2176" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:146" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0535" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=607211", "reference_id": "607211", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=607211" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2432", "reference_id": "CVE-2010-2432", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2432" }, { "reference_url": "https://security.gentoo.org/glsa/201207-10", "reference_id": "GLSA-201207-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201207-10" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2010-2432" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ur43-jbhj-k7bk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87995?format=api", "vulnerability_id": "VCID-vmjh-9kbz-qkh6", "summary": "cups: Several XSS flaws in forms processed by CUPS web interface", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2820.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2820.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2820", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83564", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83576", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83591", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83592", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83625", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83642", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83635", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.8363", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83665", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83667", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83691", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83699", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83703", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83726", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83746", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83763", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83778", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01995", "scoring_system": "epss", "scoring_elements": "0.83813", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2820" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2820", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2820" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=529833", "reference_id": "529833", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529833" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555666", "reference_id": "555666", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555666" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10001.txt", "reference_id": "CVE-2009-2820;OSVDB-59854", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10001.txt" }, { "reference_url": "https://www.securityfocus.com/bid/36958/info", "reference_id": "CVE-2009-2820;OSVDB-59854", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/36958/info" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1595", "reference_id": "RHSA-2009:1595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1595" }, { "reference_url": "https://usn.ubuntu.com/856-1/", "reference_id": "USN-856-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/856-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2009-2820" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vmjh-9kbz-qkh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33706?format=api", "vulnerability_id": "VCID-xp1f-4p3v-67ad", "summary": "Multiple vulnerabilities have been found in CUPS, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox", "reference_id": "", "reference_type": "", "scores": [], "url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2010-0811.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2010-0811.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2941.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2941.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2941", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95753", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95741", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95658", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95667", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95673", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95675", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95684", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95688", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95692", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95691", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95693", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95701", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95705", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95706", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95708", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95707", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95722", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95724", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.9573", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.21353", "scoring_system": "epss", "scoring_elements": "0.95736", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941" }, { "reference_url": "http://secunia.com/advisories/42287", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42287" }, { "reference_url": "http://secunia.com/advisories/42867", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42867" }, { "reference_url": "http://secunia.com/advisories/43521", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43521" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201207-10.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201207-10.xml" }, { "reference_url": "http://securitytracker.com/id?1024662", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024662" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62882", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/62882" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.468323", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.468323" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2011/dsa-2176", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2011/dsa-2176" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:233", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:233" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234" }, { "reference_url": "http://www.osvdb.org/68951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/68951" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0866.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0866.html" }, { "reference_url": "http://www.securityfocus.com/bid/44530", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44530" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1012-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1012-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2856" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3042", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3042" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3088", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3088" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0061" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0535", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0535" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603344", "reference_id": "603344", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=603344" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=624438", "reference_id": "624438", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=624438" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2941", "reference_id": "CVE-2010-2941", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2941" }, { "reference_url": "https://security.gentoo.org/glsa/201207-10", "reference_id": "GLSA-201207-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201207-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0811", "reference_id": "RHSA-2010:0811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0811" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0866", "reference_id": "RHSA-2010:0866", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0866" }, { "reference_url": "https://usn.ubuntu.com/1012-1/", "reference_id": "USN-1012-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1012-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2010-2941" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xp1f-4p3v-67ad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60451?format=api", "vulnerability_id": "VCID-zm2g-nduw-tfcy", "summary": "Multiple errors in CUPS might allow for the remote execution of arbitrary\n code or DNS rebinding attacks.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0164.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0164.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0164", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88816", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88747", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88746", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88756", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88772", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88784", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88782", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88792", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88716", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88729", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88727", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88726", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88741", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90407", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90412", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90426", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90432", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90392", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490597", "reference_id": "490597", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490597" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571553?format=api", "purl": "pkg:deb/debian/cups@1.4.4-7%2Bsqueeze5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-39f1-22a5-c7aw" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-48ht-j7ga-9ugq" }, { "vulnerability": "VCID-4bxg-5tnm-y3hw" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-843p-8xve-nfer" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ed99-uccv-d7bh" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-mcmb-bvw9-dba5" }, { "vulnerability": "VCID-mtzd-538p-kbhm" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-y7a9-2p1n-z7fx" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" } ], "aliases": [ "CVE-2009-0164" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zm2g-nduw-tfcy" } ], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.4.4-7%252Bsqueeze5" }