Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/571555?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "type": "deb", "namespace": "debian", "name": "cups", "version": "1.5.3-5+deb7u6", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.4.18-1", "latest_non_vulnerable_version": "2.4.18-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80613?format=api", "vulnerability_id": "VCID-2chf-23mc-d3dn", "summary": "cups: access to uninitialized buffer in ipp.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10001.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24831", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24951", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24726", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24793", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24838", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24852", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24813", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24756", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24767", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24759", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24736", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24675", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24663", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24618", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24495", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24573", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24637", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921680", "reference_id": "1921680", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921680" }, { "reference_url": "https://security.archlinux.org/ASA-202102-13", "reference_id": "ASA-202102-13", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-13" }, { "reference_url": "https://security.archlinux.org/AVG-1529", "reference_id": "AVG-1529", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1529" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4393", "reference_id": "RHSA-2021:4393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4393" }, { "reference_url": "https://usn.ubuntu.com/5454-1/", "reference_id": "USN-5454-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5454-1/" }, { "reference_url": "https://usn.ubuntu.com/5454-2/", "reference_id": "USN-5454-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5454-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2020-10001" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2chf-23mc-d3dn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57702?format=api", "vulnerability_id": "VCID-35gf-189e-3ud4", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0313.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15256", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15306", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15343", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15412", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15216", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15354", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15317", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15277", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15212", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15126", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15133", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15191", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1523", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15228", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15172", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15037", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15162", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5029" }, { "reference_url": "https://cups.org/str.php?L4455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cups.org/str.php?L4455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" }, { "reference_url": "http://secunia.com/advisories/60509", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60509" }, { "reference_url": "http://secunia.com/advisories/60787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60787" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2990", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2990" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2341-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2341-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122600", "reference_id": "1122600", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122600" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5029", "reference_id": "CVE-2014-5029", "reference_type": "", "scores": [ { "value": "1.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2341-1/", "reference_id": "USN-2341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2341-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-5029" ], "risk_score": 0.7, "exploitability": "0.5", "weighted_severity": "1.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35gf-189e-3ud4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59620?format=api", "vulnerability_id": "VCID-3ame-feez-yqhc", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1158", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99181", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99183", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99188", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99189", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.9919", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99193", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99195", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99198", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.992", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99202", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221641", "reference_id": "1221641", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221641" }, { "reference_url": "https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py", "reference_id": "CVE-2015-1158", "reference_type": "exploit", "scores": [], "url": "https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py", "reference_id": "CVE-2015-1158", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py" }, { "reference_url": "http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html", "reference_id": "CVE-2015-1158;OSVDB-123116", "reference_type": "exploit", "scores": [], "url": "http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt", "reference_id": "CVE-2015-1158;OSVDB-123116", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201510-07", "reference_id": "GLSA-201510-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123", "reference_id": "RHSA-2015:1123", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1123" }, { "reference_url": "https://usn.ubuntu.com/2629-1/", "reference_id": "USN-2629-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2629-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036256?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037284?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1" } ], "aliases": [ "CVE-2015-1158" ], "risk_score": 1.4, "exploitability": "2.0", "weighted_severity": "0.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ame-feez-yqhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68013?format=api", "vulnerability_id": "VCID-3etj-2m21-ffa1", "summary": "cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58364.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58364.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58364", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.2918", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.30003", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31552", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32467", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32388", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32436", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32463", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32429", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32402", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32439", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32668", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32735", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32857", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32875", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32781", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393078", "reference_id": "2393078", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393078" }, { "reference_url": "https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d", "reference_id": "e58cba9d6fceed4242980e51dbd1302cf638ab1d", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-11T17:37:26Z/" } ], "url": "https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d" }, { "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4", "reference_id": "GHSA-7qx3-r744-6qv4", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-11T17:37:26Z/" } ], "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15700", "reference_id": "RHSA-2025:15700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15701", "reference_id": "RHSA-2025:15701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16590", "reference_id": "RHSA-2025:16590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16591", "reference_id": "RHSA-2025:16591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16592", "reference_id": "RHSA-2025:16592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22063", "reference_id": "RHSA-2025:22063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22063" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8814", "reference_id": "RHSA-2026:8814", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8814" }, { "reference_url": "https://usn.ubuntu.com/7745-1/", "reference_id": "USN-7745-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7745-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584494?format=api", "purl": "pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9" } ], "aliases": [ "CVE-2025-58364" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3etj-2m21-ffa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94280?format=api", "vulnerability_id": "VCID-44ju-8618-vqht", "summary": "A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8842", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57666", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57528", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57612", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57633", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57609", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57663", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57667", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57661", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57641", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57671", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57645", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57603", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57623", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57602", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57558", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://usn.ubuntu.com/5454-1/", "reference_id": "USN-5454-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5454-1/" }, { "reference_url": "https://usn.ubuntu.com/5454-2/", "reference_id": "USN-5454-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5454-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2019-8842" ], "risk_score": 0.7, "exploitability": "0.5", "weighted_severity": "1.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-44ju-8618-vqht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82676?format=api", "vulnerability_id": "VCID-6mus-21kz-uuhz", "summary": "cups: Session cookie generated by the CUPS web interface is easy to guess", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4300.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4300.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4300", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.593", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59226", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59263", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59268", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.5925", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59231", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59251", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59238", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59195", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59243", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65554", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65649", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65662", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65668", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65602", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65632", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65598", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4300" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4300", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4300" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apple/cups/releases/tag/v2.2.10", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apple/cups/releases/tag/v2.2.10" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html" }, { "reference_url": "http://www.securityfocus.com/bid/107785", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107785" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695929", "reference_id": "1695929", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695929" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915909", "reference_id": "915909", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915909" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4300", "reference_id": "CVE-2018-4300", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4300" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1050", "reference_id": "RHSA-2020:1050", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1050" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2018-4300" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6mus-21kz-uuhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78840?format=api", "vulnerability_id": "VCID-7wg4-sc9v-bffk", "summary": "cups: Information leak through Cups-Get-Document operation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32360.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32360.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32360", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20097", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20037", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20154", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19884", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19963", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19992", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19917", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19921", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22605", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22537", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22443", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22526", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22539", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22548", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22709", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051953", "reference_id": "1051953", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051953" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230495", "reference_id": "2230495", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230495" }, { "reference_url": "https://support.apple.com/en-us/HT213758", "reference_id": "HT213758", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/" } ], "url": "https://support.apple.com/en-us/HT213758" }, { "reference_url": "https://support.apple.com/en-us/HT213759", "reference_id": "HT213759", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/" } ], "url": "https://support.apple.com/en-us/HT213759" }, { "reference_url": "https://support.apple.com/en-us/HT213760", "reference_id": "HT213760", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/" } ], "url": "https://support.apple.com/en-us/HT213760" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html", "reference_id": "msg00041.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4765", "reference_id": "RHSA-2023:4765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4766", "reference_id": "RHSA-2023:4766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4768", "reference_id": "RHSA-2023:4768", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4768" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4769", "reference_id": "RHSA-2023:4769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4770", "reference_id": "RHSA-2023:4770", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4770" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4771", "reference_id": "RHSA-2023:4771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4838", "reference_id": "RHSA-2023:4838", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4838" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4864", "reference_id": "RHSA-2023:4864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4864" }, { "reference_url": "https://usn.ubuntu.com/6361-1/", "reference_id": "USN-6361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6361-1/" }, { "reference_url": "https://usn.ubuntu.com/6361-2/", "reference_id": "USN-6361-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6361-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2023-32360" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7wg4-sc9v-bffk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68012?format=api", "vulnerability_id": "VCID-993k-m3sq-gufu", "summary": "cups: Authentication Bypass in CUPS Authorization Handling", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58060.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58060.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58060", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15471", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15401", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16263", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16433", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16325", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16323", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16279", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16147", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16411", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16496", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16551", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16532", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16494", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16436", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16376", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16395", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58060" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392595", "reference_id": "2392595", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392595" }, { "reference_url": "https://github.com/OpenPrinting/cups/commit/595d691075b1d396d2edfaa0a8fd0873a0a1f221", "reference_id": "595d691075b1d396d2edfaa0a8fd0873a0a1f221", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-11T17:33:32Z/" } ], "url": "https://github.com/OpenPrinting/cups/commit/595d691075b1d396d2edfaa0a8fd0873a0a1f221" }, { "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq", "reference_id": "GHSA-4c68-qgrh-rmmq", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-11T17:33:32Z/" } ], "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15700", "reference_id": "RHSA-2025:15700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15701", "reference_id": "RHSA-2025:15701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15702", "reference_id": "RHSA-2025:15702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16590", "reference_id": "RHSA-2025:16590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16591", "reference_id": "RHSA-2025:16591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16592", "reference_id": "RHSA-2025:16592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17049", "reference_id": "RHSA-2025:17049", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17049" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17054", "reference_id": "RHSA-2025:17054", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17054" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17141", "reference_id": "RHSA-2025:17141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17144", "reference_id": "RHSA-2025:17144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17164", "reference_id": "RHSA-2025:17164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0934", "reference_id": "RHSA-2026:0934", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0934" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8814", "reference_id": "RHSA-2026:8814", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8814" }, { "reference_url": "https://usn.ubuntu.com/7745-1/", "reference_id": "USN-7745-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7745-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584494?format=api", "purl": "pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9" } ], "aliases": [ "CVE-2025-58060" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-993k-m3sq-gufu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73815?format=api", "vulnerability_id": "VCID-am36-6m5v-fkba", "summary": "cups: libppd: remote command injection via attacker controlled data in PPD file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47175.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47175.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47175", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96927", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96878", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96883", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96891", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96893", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96895", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96897", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96898", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96905", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96909", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96919", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.33103", "scoring_system": "epss", "scoring_elements": "0.96923", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.33659", "scoring_system": "epss", "scoring_elements": "0.96918", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.33659", "scoring_system": "epss", "scoring_elements": "0.96955", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.33659", "scoring_system": "epss", "scoring_elements": "0.96957", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256", "reference_id": "2314256", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256" }, { "reference_url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I", "reference_id": "Attacking-UNIX-systems-via-CUPS-Part-I", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/" } ], "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I" }, { "reference_url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6", "reference_id": "GHSA-7xfx-47qg-grp6", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/" } ], "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6" }, { "reference_url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47", "reference_id": "GHSA-p9rh-jxmq-gq47", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/" } ], "url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47" }, { "reference_url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8", "reference_id": "GHSA-rj88-6mr5-rcw8", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/" } ], "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8" }, { "reference_url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5", "reference_id": "GHSA-w63j-6g73-wmg5", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/" } ], "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7346", "reference_id": "RHSA-2024:7346", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7346" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7461", "reference_id": "RHSA-2024:7461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7462", "reference_id": "RHSA-2024:7462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7463", "reference_id": "RHSA-2024:7463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7503", "reference_id": "RHSA-2024:7503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7504", "reference_id": "RHSA-2024:7504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7506", "reference_id": "RHSA-2024:7506", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7506" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7551", "reference_id": "RHSA-2024:7551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7551" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7553", "reference_id": "RHSA-2024:7553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7623", "reference_id": "RHSA-2024:7623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9470", "reference_id": "RHSA-2024:9470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0083", "reference_id": "RHSA-2025:0083", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0083" }, { "reference_url": "https://usn.ubuntu.com/7041-1/", "reference_id": "USN-7041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7041-1/" }, { "reference_url": "https://usn.ubuntu.com/7041-2/", "reference_id": "USN-7041-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7041-2/" }, { "reference_url": "https://usn.ubuntu.com/7041-3/", "reference_id": "USN-7041-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7041-3/" }, { "reference_url": "https://usn.ubuntu.com/7045-1/", "reference_id": "USN-7045-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7045-1/" }, { "reference_url": "https://www.cups.org", "reference_id": "www.cups.org", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/" } ], "url": "https://www.cups.org" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584494?format=api", "purl": "pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9" } ], "aliases": [ "CVE-2024-47175" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-am36-6m5v-fkba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57701?format=api", "vulnerability_id": "VCID-anr5-gc12-e7dr", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0313.html" }, { "reference_url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16598", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16637", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16809", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16867", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16652", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16791", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16771", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16727", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1667", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16606", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16614", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16653", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16555", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16544", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16509", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16374", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16493", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" }, { "reference_url": "http://secunia.com/advisories/59945", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59945" }, { "reference_url": "http://secunia.com/advisories/60273", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60273" }, { "reference_url": "http://secunia.com/advisories/60787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60787" }, { "reference_url": "https://support.apple.com/kb/HT6535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT6535" }, { "reference_url": "http://www.cups.org/blog.php?L724", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cups.org/blog.php?L724" }, { "reference_url": "http://www.cups.org/str.php?L4450", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cups.org/str.php?L4450" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108" }, { "reference_url": "http://www.securityfocus.com/bid/68788", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68788" }, { "reference_url": "http://www.securitytracker.com/id/1030611", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030611" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2293-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2293-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115576", "reference_id": "1115576", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115576" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3537", "reference_id": "CVE-2014-3537", "reference_type": "", "scores": [ { "value": "1.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3537" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2293-1/", "reference_id": "USN-2293-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2293-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-3537" ], "risk_score": 0.6, "exploitability": "0.5", "weighted_severity": "1.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-anr5-gc12-e7dr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94174?format=api", "vulnerability_id": "VCID-apyh-1uza-pffa", "summary": "In array_find of array.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure in the printer spooler with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-111210196", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2228", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28106", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28179", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28222", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28017", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28084", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28128", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28134", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28091", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28033", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28043", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27978", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27895", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27783", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27707", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27536", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27597", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2762", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2228" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2228", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2228" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946782", "reference_id": "946782", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946782" }, { "reference_url": "https://usn.ubuntu.com/4340-1/", "reference_id": "USN-4340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4340-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2019-2228" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-apyh-1uza-pffa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31916?format=api", "vulnerability_id": "VCID-aznw-8yer-xfhf", "summary": "Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34241", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.0979", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09768", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09785", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09816", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09807", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09757", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09686", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10737", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11703", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1158", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11662", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1147", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11548", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11622", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17257", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17165", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/06/26/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/06/26/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/06/23/10", "reference_id": "10", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/06/23/10" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885", "reference_id": "1038885", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214914", "reference_id": "2214914", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214914" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/", "reference_id": "7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/" }, { "reference_url": "https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2", "reference_id": "9809947a959e18409dcf562a3466ef246cb90cb2", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2" }, { "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25", "reference_id": "GHSA-qjgh-5hcq-5f25", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-17", "reference_id": "GLSA-202402-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-17" }, { "reference_url": "https://support.apple.com/kb/HT213843", "reference_id": "HT213843", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://support.apple.com/kb/HT213843" }, { "reference_url": "https://support.apple.com/kb/HT213844", "reference_id": "HT213844", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://support.apple.com/kb/HT213844" }, { "reference_url": "https://support.apple.com/kb/HT213845", "reference_id": "HT213845", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://support.apple.com/kb/HT213845" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html", "reference_id": "msg00038.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6596", "reference_id": "RHSA-2023:6596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7165", "reference_id": "RHSA-2023:7165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1101", "reference_id": "RHSA-2024:1101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1409", "reference_id": "RHSA-2024:1409", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1409" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/", "reference_id": "TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/" }, { "reference_url": "https://usn.ubuntu.com/6184-1/", "reference_id": "USN-6184-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6184-1/" }, { "reference_url": "https://usn.ubuntu.com/6184-2/", "reference_id": "USN-6184-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6184-2/" }, { "reference_url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.6", "reference_id": "v2.4.6", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/" } ], "url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.6" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2023-34241" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aznw-8yer-xfhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34381?format=api", "vulnerability_id": "VCID-bzht-vhe3-y7bf", "summary": "Multiple vulnerabilities have been found in CUPS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29812", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30176", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3019", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30171", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30128", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30056", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29941", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29872", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29735", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29801", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40939", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.4095", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40957", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40864", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40946", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40975", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.409", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html" }, { "reference_url": "https://support.apple.com/HT208849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208849" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4243", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4243" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607282", "reference_id": "1607282", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607282" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4180", "reference_id": "CVE-2018-4180", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4180" }, { "reference_url": "https://security.gentoo.org/glsa/201908-08", "reference_id": "GLSA-201908-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1050", "reference_id": "RHSA-2020:1050", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1050" }, { "reference_url": "https://usn.ubuntu.com/3713-1/", "reference_id": "USN-3713-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3713-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037285?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2018-4180" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bzht-vhe3-y7bf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86391?format=api", "vulnerability_id": "VCID-cf81-58ju-bqaz", "summary": "cups: cross-site scripting flaw fixed in the 1.7.2 release", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2856.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2856.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2856", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77324", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77331", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77359", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.7734", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.7737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77379", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77406", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77385", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77382", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77422", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77414", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77448", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77456", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77467", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77475", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77502", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77525", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087122", "reference_id": "1087122", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087122" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2172-1/", "reference_id": "USN-2172-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2172-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-2856" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cf81-58ju-bqaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81400?format=api", "vulnerability_id": "VCID-ev9c-v5dv-37fb", "summary": "cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3898.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3898.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3898", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37102", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37269", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37296", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37125", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37177", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3719", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37201", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37167", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37185", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37111", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36887", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36855", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36767", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36649", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36717", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36741", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1823964", "reference_id": "1823964", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1823964" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4469", "reference_id": "RHSA-2020:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4469" }, { "reference_url": "https://usn.ubuntu.com/4340-1/", "reference_id": "USN-4340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4340-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2020-3898" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ev9c-v5dv-37fb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57703?format=api", "vulnerability_id": "VCID-fby6-8f6z-63fw", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0313.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16117", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16109", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16292", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16354", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16153", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16239", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16304", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16286", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16247", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16116", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16134", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16172", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16061", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16059", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16021", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.15902", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16015", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5030" }, { "reference_url": "https://cups.org/str.php?L4455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cups.org/str.php?L4455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" }, { "reference_url": "http://secunia.com/advisories/60509", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60509" }, { "reference_url": "http://secunia.com/advisories/60787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60787" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2990", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2990" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2341-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2341-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128764", "reference_id": "1128764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128764" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5030", "reference_id": "CVE-2014-5030", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2341-1/", "reference_id": "USN-2341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2341-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-5030" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fby6-8f6z-63fw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83888?format=api", "vulnerability_id": "VCID-fkyp-m1p9-mfhy", "summary": "cups: Invalid usernames handled in scheduler/ipp.c:add_job() allow remote attackers to cause a denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18248.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18248.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18248", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.76945", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.76951", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.7698", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.76962", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.76994", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77006", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77034", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77012", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77009", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.7705", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77052", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77044", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77079", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77086", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.771", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77108", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77137", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77159", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18248" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18248" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561296", "reference_id": "1561296", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561296" }, { "reference_url": "https://usn.ubuntu.com/3713-1/", "reference_id": "USN-3713-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3713-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2017-18248" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fkyp-m1p9-mfhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75351?format=api", "vulnerability_id": "VCID-k4yw-jg6v-1bcc", "summary": "cups: Cupsd Listen arbitrary chmod 0140777", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35235.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35235.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35235", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.8689", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86756", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86776", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86773", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86793", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86802", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86815", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86811", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86807", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86822", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86826", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86825", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86841", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86848", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03102", "scoring_system": "epss", "scoring_elements": "0.86872", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/11/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/06/11/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073002", "reference_id": "1073002", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073002" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2290318", "reference_id": "2290318", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2290318" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/12/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/06/12/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/12/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/06/12/5" }, { "reference_url": "https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d", "reference_id": "ff1f8a623e090dee8a8aadf12a6a4b25efac143d", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d" }, { "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f", "reference_id": "GHSA-vvwp-mv6j-hw6f", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f" }, { "reference_url": "https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240", "reference_id": "http-addr.c#L229-L240", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html", "reference_id": "msg00001.html", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4265", "reference_id": "RHSA-2024:4265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4580", "reference_id": "RHSA-2024:4580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4715", "reference_id": "RHSA-2024:4715", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4715" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4776", "reference_id": "RHSA-2024:4776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4776" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5644", "reference_id": "RHSA-2024:5644", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5644" }, { "reference_url": "https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21", "reference_id": "user-tmp#n21", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/" } ], "url": "https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21" }, { "reference_url": "https://usn.ubuntu.com/6844-1/", "reference_id": "USN-6844-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6844-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2024-35235" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k4yw-jg6v-1bcc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31913?format=api", "vulnerability_id": "VCID-p8gy-dd3u-uqh4", "summary": "Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26691", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09443", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09492", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10972", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10974", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10942", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10782", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10796", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10876", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10835", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10773", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10717", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10851", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10924", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10841", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10917", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c" }, { "reference_url": "https://support.apple.com/en-us/HT213183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/en-us/HT213183" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769", "reference_id": "1011769", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084321", "reference_id": "2084321", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084321" }, { "reference_url": "https://security.gentoo.org/glsa/202402-17", "reference_id": "GLSA-202402-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4990", "reference_id": "RHSA-2022:4990", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4990" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5054", "reference_id": "RHSA-2022:5054", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5054" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5055", "reference_id": "RHSA-2022:5055", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5055" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5056", "reference_id": "RHSA-2022:5056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5057", "reference_id": "RHSA-2022:5057", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5057" }, { "reference_url": "https://usn.ubuntu.com/5454-1/", "reference_id": "USN-5454-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5454-1/" }, { "reference_url": "https://usn.ubuntu.com/5454-2/", "reference_id": "USN-5454-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5454-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2022-26691", " MNDT-2022-0026" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p8gy-dd3u-uqh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83662?format=api", "vulnerability_id": "VCID-pwkd-sgtt-1bef", "summary": "cups: DNS rebinding attacks via incorrect whitelist", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18190.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18190.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18190", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71939", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71966", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71993", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72017", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72001", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71985", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72026", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72034", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72018", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72063", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.7207", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72056", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72088", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72115", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18190" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546395", "reference_id": "1546395", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3864", "reference_id": "RHSA-2020:3864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3864" }, { "reference_url": "https://usn.ubuntu.com/3577-1/", "reference_id": "USN-3577-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3577-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2017-18190" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pwkd-sgtt-1bef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31915?format=api", "vulnerability_id": "VCID-q8a8-fd7r-1kg7", "summary": "Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32324", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46866", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46907", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46883", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.4683", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46885", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46884", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.4688", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00238", "scoring_system": "epss", "scoring_elements": "0.46887", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49244", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49119", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49279", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49276", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49246", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49235", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49202", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.49182", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00259", "scoring_system": "epss", "scoring_elements": "0.4921", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209603", "reference_id": "2209603", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209603" }, { "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7", "reference_id": "GHSA-cxc6-w2g7-69p7", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/" } ], "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7" }, { "reference_url": "https://security.gentoo.org/glsa/202402-17", "reference_id": "GLSA-202402-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html", "reference_id": "msg00001.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6596", "reference_id": "RHSA-2023:6596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7165", "reference_id": "RHSA-2023:7165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1101", "reference_id": "RHSA-2024:1101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1409", "reference_id": "RHSA-2024:1409", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1409" }, { "reference_url": "https://usn.ubuntu.com/6128-1/", "reference_id": "USN-6128-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6128-1/" }, { "reference_url": "https://usn.ubuntu.com/6128-2/", "reference_id": "USN-6128-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6128-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2023-32324" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q8a8-fd7r-1kg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94170?format=api", "vulnerability_id": "VCID-qxwq-vp9g-ukca", "summary": "In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04025", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0399", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0383", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03868", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03878", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03892", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03897", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03922", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0389", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03871", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03845", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03824", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03833", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03953", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03967", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03971", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04015", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.03973", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2180" }, { "reference_url": "https://source.android.com/security/bulletin/2019-09-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2019-09-01" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957", "reference_id": "934957", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2180", "reference_id": "CVE-2019-2180", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2180" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2019-2180" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qxwq-vp9g-ukca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59622?format=api", "vulnerability_id": "VCID-ucmb-we3r-aqcd", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1159", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98202", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98206", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.9821", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98211", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98216", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.9822", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98219", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98225", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98227", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98224", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98226", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98228", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98234", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98238", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221642", "reference_id": "1221642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221642" }, { "reference_url": "https://security.gentoo.org/glsa/201510-07", "reference_id": "GLSA-201510-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123", "reference_id": "RHSA-2015:1123", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1123" }, { "reference_url": "https://usn.ubuntu.com/2629-1/", "reference_id": "USN-2629-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2629-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036256?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037284?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1" } ], "aliases": [ "CVE-2015-1159" ], "risk_score": 0.2, "exploitability": "0.5", "weighted_severity": "0.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ucmb-we3r-aqcd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36514?format=api", "vulnerability_id": "VCID-ukec-69r2-xbef", "summary": "A buffer overflow in CUPS might allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9679", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91768", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91673", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91682", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91696", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91709", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91715", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91719", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91721", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91717", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91738", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.9173", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91732", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91737", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91734", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91745", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91758", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191588", "reference_id": "1191588", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191588" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387", "reference_id": "778387", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387" }, { "reference_url": "https://security.gentoo.org/glsa/201607-06", "reference_id": "GLSA-201607-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123", "reference_id": "RHSA-2015:1123", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1123" }, { "reference_url": "https://usn.ubuntu.com/2520-1/", "reference_id": "USN-2520-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2520-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-9679" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ukec-69r2-xbef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31914?format=api", "vulnerability_id": "VCID-vx54-r2dt-8ue5", "summary": "Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4504", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10426", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1051", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10494", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10354", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10427", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10522", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10489", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10466", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10334", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10307", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10437", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1042", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10352", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10297", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10442", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4504" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238509", "reference_id": "2238509", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238509" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/", "reference_id": "5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/", "reference_id": "5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/", "reference_id": "AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/" }, { "reference_url": "https://takeonme.org/cves/CVE-2023-4504.html", "reference_id": "CVE-2023-4504.html", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://takeonme.org/cves/CVE-2023-4504.html" }, { "reference_url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6", "reference_id": "GHSA-4f65-6ph5-qwh6", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6" }, { "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h", "reference_id": "GHSA-pf5r-86w9-678h", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h" }, { "reference_url": "https://security.gentoo.org/glsa/202402-17", "reference_id": "GLSA-202402-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-17" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html", "reference_id": "msg00041.html", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/", "reference_id": "PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/", "reference_id": "T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/" }, { "reference_url": "https://usn.ubuntu.com/6391-1/", "reference_id": "USN-6391-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6391-1/" }, { "reference_url": "https://usn.ubuntu.com/6391-2/", "reference_id": "USN-6391-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6391-2/" }, { "reference_url": "https://usn.ubuntu.com/6392-1/", "reference_id": "USN-6392-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6392-1/" }, { "reference_url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.7", "reference_id": "v2.4.7", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/" } ], "url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.7" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2023-4504" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vx54-r2dt-8ue5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34382?format=api", "vulnerability_id": "VCID-w17y-dvuq-7ba6", "summary": "Multiple vulnerabilities have been found in CUPS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4181", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2753", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27951", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27959", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27942", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27893", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27807", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27695", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27621", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27448", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27508", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39512", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39331", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39486", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39501", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39474", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39517", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39431", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html" }, { "reference_url": "https://support.apple.com/HT208849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208849" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4243", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4243" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607291", "reference_id": "1607291", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607291" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4181", "reference_id": "CVE-2018-4181", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:N/A:N" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4181" }, { "reference_url": "https://security.gentoo.org/glsa/201908-08", "reference_id": "GLSA-201908-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1050", "reference_id": "RHSA-2020:1050", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1050" }, { "reference_url": "https://usn.ubuntu.com/3713-1/", "reference_id": "USN-3713-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3713-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037285?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2018-4181" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w17y-dvuq-7ba6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86418?format=api", "vulnerability_id": "VCID-wjht-u5u1-kkas", "summary": "cups: lppasswd vulnerability allows data access to unprivileged user", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6891.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6891.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6891", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1417", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14244", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14305", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14116", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14197", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14251", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14155", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13989", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14068", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14106", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14011", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13889", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14046", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14135", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6891" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6891", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6891" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051645", "reference_id": "1051645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051645" }, { "reference_url": "https://usn.ubuntu.com/2082-1/", "reference_id": "USN-2082-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2082-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2013-6891" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wjht-u5u1-kkas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82264?format=api", "vulnerability_id": "VCID-wqu4-wys6-hfbb", "summary": "cups: stack-buffer-overflow in libcups's asn1_get_type function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8675.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8675.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8675", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80524", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80553", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80545", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80574", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80584", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80601", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80579", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80607", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.8061", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80638", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80641", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80657", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80675", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80697", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80716", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8675" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738455", "reference_id": "1738455", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738455" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957", "reference_id": "934957", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1765", "reference_id": "RHSA-2020:1765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3864", "reference_id": "RHSA-2020:3864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3864" }, { "reference_url": "https://usn.ubuntu.com/4105-1/", "reference_id": "USN-4105-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4105-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2019-8675" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqu4-wys6-hfbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57704?format=api", "vulnerability_id": "VCID-yyrd-qt22-w3f5", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0313.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81949", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81742", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81752", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81775", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81772", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81799", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81805", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81825", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81812", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81807", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81844", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81845", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81847", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81871", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81881", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81886", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81904", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81924", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5031" }, { "reference_url": "https://cups.org/str.php?L4455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cups.org/str.php?L4455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" }, { "reference_url": "http://secunia.com/advisories/60509", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60509" }, { "reference_url": "http://secunia.com/advisories/60787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60787" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2990", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2990" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2341-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2341-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128767", "reference_id": "1128767", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128767" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5031", "reference_id": "CVE-2014-5031", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5031" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2341-1/", "reference_id": "USN-2341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2341-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-5031" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yyrd-qt22-w3f5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34380?format=api", "vulnerability_id": "VCID-zjj3-g2d7-c3gd", "summary": "Multiple vulnerabilities have been found in CUPS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15400", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.6126", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.6134", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61369", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61338", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61385", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61401", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61422", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61407", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61427", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61431", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61413", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61415", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61409", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61361", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61411", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.6147", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607288", "reference_id": "1607288", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607288" }, { "reference_url": "https://security.gentoo.org/glsa/201908-08", "reference_id": "GLSA-201908-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037285?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2017-15400" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zjj3-g2d7-c3gd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34386?format=api", "vulnerability_id": "VCID-zt43-htwu-kfde", "summary": "Multiple vulnerabilities have been found in CUPS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34985", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35183", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35093", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35137", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35163", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35133", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35145", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35131", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35082", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3485", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34833", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34743", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34615", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34688", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34725", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607285", "reference_id": "1607285", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607285" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605", "reference_id": "903605", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605" }, { "reference_url": "https://security.gentoo.org/glsa/201908-08", "reference_id": "GLSA-201908-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201908-08" }, { "reference_url": "https://usn.ubuntu.com/3713-1/", "reference_id": "USN-3713-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3713-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037285?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api", "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6" } ], "aliases": [ "CVE-2018-6553" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zt43-htwu-kfde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82265?format=api", "vulnerability_id": "VCID-zxp7-6d69-tfhm", "summary": "cups: stack-buffer-overflow in libcups's asn1_get_packed function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8696.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8696.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8696", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80524", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80553", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80545", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80574", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80584", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80601", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80579", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80607", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.8061", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80638", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80641", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80657", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80675", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80697", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80716", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738497", "reference_id": "1738497", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738497" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957", "reference_id": "934957", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1765", "reference_id": "RHSA-2020:1765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3864", "reference_id": "RHSA-2020:3864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3864" }, { "reference_url": "https://usn.ubuntu.com/4105-1/", "reference_id": "USN-4105-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4105-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api", "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-63fa-a4pr-wqh3" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-b1yf-xuc1-ykak" }, { "vulnerability": "VCID-dx89-e1nn-w7gz" }, { "vulnerability": "VCID-gwcb-nhpk-2kca" }, { "vulnerability": "VCID-hc4t-becn-rkcc" }, { "vulnerability": "VCID-jy1y-e1nk-p3b4" }, { "vulnerability": "VCID-r1q4-2dq2-33ca" }, { "vulnerability": "VCID-ry9y-z4e4-yfdh" }, { "vulnerability": "VCID-vgtp-sjtt-73e9" }, { "vulnerability": "VCID-wr17-e776-bqh1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8" } ], "aliases": [ "CVE-2019-8696" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zxp7-6d69-tfhm" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57702?format=api", "vulnerability_id": "VCID-35gf-189e-3ud4", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0313.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15256", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15306", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15343", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15412", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15216", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15354", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15317", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15277", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15212", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15126", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15133", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15191", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1523", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15228", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15172", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15037", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15162", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5029" }, { "reference_url": "https://cups.org/str.php?L4455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cups.org/str.php?L4455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" }, { "reference_url": "http://secunia.com/advisories/60509", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60509" }, { "reference_url": "http://secunia.com/advisories/60787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60787" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2990", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2990" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2341-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2341-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122600", "reference_id": "1122600", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122600" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5029", "reference_id": "CVE-2014-5029", "reference_type": "", "scores": [ { "value": "1.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2341-1/", "reference_id": "USN-2341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2341-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-5029" ], "risk_score": 0.7, "exploitability": "0.5", "weighted_severity": "1.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35gf-189e-3ud4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48145?format=api", "vulnerability_id": "VCID-39f1-22a5-c7aw", "summary": "Multiple vulnerabilities have been found in cups-filters, the worst\n of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3258", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97131", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97138", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97144", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97154", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97159", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.9716", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97161", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97169", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.9717", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97174", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97175", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97176", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97178", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97183", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97187", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.37078", "scoring_system": "epss", "scoring_elements": "0.97192", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3258" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235385", "reference_id": "1235385", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235385" }, { "reference_url": "https://security.gentoo.org/glsa/201510-08", "reference_id": "GLSA-201510-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2360", "reference_id": "RHSA-2015:2360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2360" }, { "reference_url": "https://usn.ubuntu.com/2659-1/", "reference_id": "USN-2659-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2659-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2015-3258" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-39f1-22a5-c7aw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59620?format=api", "vulnerability_id": "VCID-3ame-feez-yqhc", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1158", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99181", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99183", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99188", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99189", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.9919", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99193", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99195", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99198", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.992", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.81706", "scoring_system": "epss", "scoring_elements": "0.99202", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221641", "reference_id": "1221641", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221641" }, { "reference_url": "https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py", "reference_id": "CVE-2015-1158", "reference_type": "exploit", "scores": [], "url": "https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py", "reference_id": "CVE-2015-1158", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py" }, { "reference_url": "http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html", "reference_id": "CVE-2015-1158;OSVDB-123116", "reference_type": "exploit", "scores": [], "url": "http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt", "reference_id": "CVE-2015-1158;OSVDB-123116", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201510-07", "reference_id": "GLSA-201510-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123", "reference_id": "RHSA-2015:1123", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1123" }, { "reference_url": "https://usn.ubuntu.com/2629-1/", "reference_id": "USN-2629-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2629-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036256?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037284?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1" } ], "aliases": [ "CVE-2015-1158" ], "risk_score": 1.4, "exploitability": "2.0", "weighted_severity": "0.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ame-feez-yqhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33707?format=api", "vulnerability_id": "VCID-48ht-j7ga-9ugq", "summary": "Multiple vulnerabilities have been found in CUPS, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3170.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3170.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3170", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92649", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92662", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92673", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92677", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92683", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92696", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.927", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92703", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92698", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92707", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92721", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.09148", "scoring_system": "epss", "scoring_elements": "0.92732", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3170" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=732106", "reference_id": "732106", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=732106" }, { "reference_url": "https://security.gentoo.org/glsa/201207-10", "reference_id": "GLSA-201207-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201207-10" }, { "reference_url": "https://usn.ubuntu.com/1207-1/", "reference_id": "USN-1207-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1207-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2011-3170" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-48ht-j7ga-9ugq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32182?format=api", "vulnerability_id": "VCID-4bxg-5tnm-y3hw", "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6476", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.5254", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52612", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52578", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52629", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52674", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52657", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52642", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.5268", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52671", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52622", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52632", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52595", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52537", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.5259", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52636", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6476" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318", "reference_id": "741318", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333", "reference_id": "741333", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333" }, { "reference_url": "https://security.gentoo.org/glsa/201406-16", "reference_id": "GLSA-201406-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-16" }, { "reference_url": "https://usn.ubuntu.com/2143-1/", "reference_id": "USN-2143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2143-1/" }, { "reference_url": "https://usn.ubuntu.com/2144-1/", "reference_id": "USN-2144-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2144-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2013-6476" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4bxg-5tnm-y3hw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32179?format=api", "vulnerability_id": "VCID-843p-8xve-nfer", "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6474", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95567", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95576", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95581", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95589", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95592", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95597", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95598", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.956", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95609", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95613", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95614", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95616", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95615", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95632", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95635", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.20771", "scoring_system": "epss", "scoring_elements": "0.95642", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6474" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318", "reference_id": "741318", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333", "reference_id": "741333", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333" }, { "reference_url": "https://security.gentoo.org/glsa/201406-16", "reference_id": "GLSA-201406-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-16" }, { "reference_url": "https://usn.ubuntu.com/2143-1/", "reference_id": "USN-2143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2143-1/" }, { "reference_url": "https://usn.ubuntu.com/2144-1/", "reference_id": "USN-2144-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2144-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2013-6474" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-843p-8xve-nfer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57701?format=api", "vulnerability_id": "VCID-anr5-gc12-e7dr", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0313.html" }, { "reference_url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16598", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16637", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16809", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16867", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16652", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16791", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16771", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16727", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1667", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16606", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16614", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16653", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16555", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16544", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16509", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16374", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16493", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" }, { "reference_url": "http://secunia.com/advisories/59945", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59945" }, { "reference_url": "http://secunia.com/advisories/60273", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60273" }, { "reference_url": "http://secunia.com/advisories/60787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60787" }, { "reference_url": "https://support.apple.com/kb/HT6535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT6535" }, { "reference_url": "http://www.cups.org/blog.php?L724", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cups.org/blog.php?L724" }, { "reference_url": "http://www.cups.org/str.php?L4450", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cups.org/str.php?L4450" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108" }, { "reference_url": "http://www.securityfocus.com/bid/68788", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68788" }, { "reference_url": "http://www.securitytracker.com/id/1030611", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030611" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2293-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2293-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115576", "reference_id": "1115576", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115576" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3537", "reference_id": "CVE-2014-3537", "reference_type": "", "scores": [ { "value": "1.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3537" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2293-1/", "reference_id": "USN-2293-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2293-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-3537" ], "risk_score": 0.6, "exploitability": "0.5", "weighted_severity": "1.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-anr5-gc12-e7dr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48146?format=api", "vulnerability_id": "VCID-ed99-uccv-d7bh", "summary": "Multiple vulnerabilities have been found in cups-filters, the worst\n of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3279", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96967", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96975", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96979", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96981", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.9699", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96991", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96993", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96994", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.96995", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97004", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97007", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.9701", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97011", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97015", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97018", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97022", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.34505", "scoring_system": "epss", "scoring_elements": "0.97029", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3279" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238990", "reference_id": "1238990", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238990" }, { "reference_url": "https://security.gentoo.org/glsa/201510-08", "reference_id": "GLSA-201510-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2360", "reference_id": "RHSA-2015:2360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2360" }, { "reference_url": "https://usn.ubuntu.com/2659-1/", "reference_id": "USN-2659-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2659-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2015-3279" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ed99-uccv-d7bh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57703?format=api", "vulnerability_id": "VCID-fby6-8f6z-63fw", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0313.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16117", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16109", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16292", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16354", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16153", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16239", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16304", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16286", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16247", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16116", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16134", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16172", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16061", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16059", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16021", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.15902", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16015", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5030" }, { "reference_url": "https://cups.org/str.php?L4455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cups.org/str.php?L4455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" }, { "reference_url": "http://secunia.com/advisories/60509", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60509" }, { "reference_url": "http://secunia.com/advisories/60787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60787" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2990", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2990" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2341-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2341-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128764", "reference_id": "1128764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128764" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5030", "reference_id": "CVE-2014-5030", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2341-1/", "reference_id": "USN-2341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2341-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-5030" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fby6-8f6z-63fw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32181?format=api", "vulnerability_id": "VCID-mcmb-bvw9-dba5", "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6475", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95557", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95566", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95573", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.9558", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95583", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95588", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.9559", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95599", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95604", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95605", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95607", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95622", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95625", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.20679", "scoring_system": "epss", "scoring_elements": "0.95632", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550", "reference_id": "1027550", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318", "reference_id": "741318", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333", "reference_id": "741333", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333" }, { "reference_url": "https://security.gentoo.org/glsa/201406-16", "reference_id": "GLSA-201406-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-16" }, { "reference_url": "https://usn.ubuntu.com/2143-1/", "reference_id": "USN-2143-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2143-1/" }, { "reference_url": "https://usn.ubuntu.com/2144-1/", "reference_id": "USN-2144-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2144-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2013-6475" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mcmb-bvw9-dba5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41478?format=api", "vulnerability_id": "VCID-mtzd-538p-kbhm", "summary": "A vulnerability in CUPS may allow for arbitrary file access.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0580.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0580.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5519.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5519.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5519", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93203", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93114", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93123", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93127", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93126", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93134", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93144", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93141", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93143", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93159", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93164", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93171", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93176", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93172", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93179", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.10228", "scoring_system": "epss", "scoring_elements": "0.93193", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80012" }, { "reference_url": "http://support.apple.com/kb/HT5784", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT5784" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/11/10/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/11/10/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/11/11/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/11/11/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/11/11/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/11/11/5" }, { "reference_url": "http://www.securityfocus.com/bid/56494", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/56494" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1654-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1654-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791", "reference_id": "692791", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=875898", "reference_id": "875898", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875898" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5519", "reference_id": "CVE-2012-5519", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5519" }, { "reference_url": "https://security.gentoo.org/glsa/201404-01", "reference_id": "GLSA-201404-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201404-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0580", "reference_id": "RHSA-2013:0580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0580" }, { "reference_url": "https://usn.ubuntu.com/1654-1/", "reference_id": "USN-1654-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1654-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2012-5519" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mtzd-538p-kbhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59622?format=api", "vulnerability_id": "VCID-ucmb-we3r-aqcd", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1159", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98202", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98206", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.9821", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98211", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98216", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.9822", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98219", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98225", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98227", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98224", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98226", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98228", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98234", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.58776", "scoring_system": "epss", "scoring_elements": "0.98238", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221642", "reference_id": "1221642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221642" }, { "reference_url": "https://security.gentoo.org/glsa/201510-07", "reference_id": "GLSA-201510-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201510-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123", "reference_id": "RHSA-2015:1123", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1123" }, { "reference_url": "https://usn.ubuntu.com/2629-1/", "reference_id": "USN-2629-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2629-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036256?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037284?format=api", "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1" } ], "aliases": [ "CVE-2015-1159" ], "risk_score": 0.2, "exploitability": "0.5", "weighted_severity": "0.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ucmb-we3r-aqcd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36514?format=api", "vulnerability_id": "VCID-ukec-69r2-xbef", "summary": "A buffer overflow in CUPS might allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9679", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91768", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91673", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91682", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91687", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91696", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91709", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91715", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91719", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91721", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91717", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91738", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.9173", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91732", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91737", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91734", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91745", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07364", "scoring_system": "epss", "scoring_elements": "0.91758", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191588", "reference_id": "1191588", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191588" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387", "reference_id": "778387", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387" }, { "reference_url": "https://security.gentoo.org/glsa/201607-06", "reference_id": "GLSA-201607-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123", "reference_id": "RHSA-2015:1123", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1123" }, { "reference_url": "https://usn.ubuntu.com/2520-1/", "reference_id": "USN-2520-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2520-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-9679" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ukec-69r2-xbef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56772?format=api", "vulnerability_id": "VCID-y7a9-2p1n-z7fx", "summary": "Multiple vulnerabilities have been found in GIMP, the worst of\n which allow execution of arbitrary code or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2896.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2896.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2896", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.9157", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91584", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91606", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91612", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91616", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91618", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91615", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91637", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.9163", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91629", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91636", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91635", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91632", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91645", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91658", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.07216", "scoring_system": "epss", "scoring_elements": "0.91668", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2896" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643753", "reference_id": "643753", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643753" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=727800", "reference_id": "727800", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727800" }, { "reference_url": "https://security.gentoo.org/glsa/201209-23", "reference_id": "GLSA-201209-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1635", "reference_id": "RHSA-2011:1635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1635" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0302", "reference_id": "RHSA-2012:0302", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0302" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1180", "reference_id": "RHSA-2012:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1181", "reference_id": "RHSA-2012:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1181" }, { "reference_url": "https://usn.ubuntu.com/1207-1/", "reference_id": "USN-1207-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1207-1/" }, { "reference_url": "https://usn.ubuntu.com/1214-1/", "reference_id": "USN-1214-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1214-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" } ], "aliases": [ "CVE-2011-2896" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y7a9-2p1n-z7fx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57704?format=api", "vulnerability_id": "VCID-yyrd-qt22-w3f5", "summary": "security update", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0313.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81949", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81742", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81752", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81775", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81772", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81799", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81805", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81825", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81812", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81807", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81844", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81845", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81847", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81871", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81881", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81886", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81904", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01618", "scoring_system": "epss", "scoring_elements": "0.81924", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5031" }, { "reference_url": "https://cups.org/str.php?L4455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cups.org/str.php?L4455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" }, { "reference_url": "http://secunia.com/advisories/60509", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60509" }, { "reference_url": "http://secunia.com/advisories/60787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60787" }, { "reference_url": "http://www.debian.org/security/2014/dsa-2990", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-2990" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2341-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2341-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128767", "reference_id": "1128767", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128767" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5031", "reference_id": "CVE-2014-5031", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5031" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388", "reference_id": "RHSA-2014:1388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1388" }, { "reference_url": "https://usn.ubuntu.com/2341-1/", "reference_id": "USN-2341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2341-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api", "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-35gf-189e-3ud4" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-anr5-gc12-e7dr" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-cf81-58ju-bqaz" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fby6-8f6z-63fw" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-ukec-69r2-xbef" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wjht-u5u1-kkas" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-yyrd-qt22-w3f5" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api", "purl": "pkg:deb/debian/cups@1.7.5-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2chf-23mc-d3dn" }, { "vulnerability": "VCID-3ame-feez-yqhc" }, { "vulnerability": "VCID-3etj-2m21-ffa1" }, { "vulnerability": "VCID-44ju-8618-vqht" }, { "vulnerability": "VCID-6mus-21kz-uuhz" }, { "vulnerability": "VCID-7wg4-sc9v-bffk" }, { "vulnerability": "VCID-993k-m3sq-gufu" }, { "vulnerability": "VCID-am36-6m5v-fkba" }, { "vulnerability": "VCID-apyh-1uza-pffa" }, { "vulnerability": "VCID-aznw-8yer-xfhf" }, { "vulnerability": "VCID-bzht-vhe3-y7bf" }, { "vulnerability": "VCID-ev9c-v5dv-37fb" }, { "vulnerability": "VCID-fkyp-m1p9-mfhy" }, { "vulnerability": "VCID-k4yw-jg6v-1bcc" }, { "vulnerability": "VCID-p8gy-dd3u-uqh4" }, { "vulnerability": "VCID-pwkd-sgtt-1bef" }, { "vulnerability": "VCID-q8a8-fd7r-1kg7" }, { "vulnerability": "VCID-qxwq-vp9g-ukca" }, { "vulnerability": "VCID-ucmb-we3r-aqcd" }, { "vulnerability": "VCID-vx54-r2dt-8ue5" }, { "vulnerability": "VCID-w17y-dvuq-7ba6" }, { "vulnerability": "VCID-wqu4-wys6-hfbb" }, { "vulnerability": "VCID-zjj3-g2d7-c3gd" }, { "vulnerability": "VCID-zt43-htwu-kfde" }, { "vulnerability": "VCID-zxp7-6d69-tfhm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11" } ], "aliases": [ "CVE-2014-5031" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yyrd-qt22-w3f5" } ], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6" }