{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","type":"deb","namespace":"debian","name":"cups","version":"1.5.3-5+deb7u6","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.4.18-1","latest_non_vulnerable_version":"2.4.18-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80613?format=json","vulnerability_id":"VCID-2chf-23mc-d3dn","summary":"cups: access to uninitialized buffer in ipp.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10001.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10001.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10001","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24831","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24951","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24726","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24793","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24838","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24852","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24813","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24756","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24767","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24759","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24736","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24675","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24663","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24618","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24495","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24573","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1921680","reference_id":"1921680","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1921680"},{"reference_url":"https://security.archlinux.org/ASA-202102-13","reference_id":"ASA-202102-13","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-13"},{"reference_url":"https://security.archlinux.org/AVG-1529","reference_id":"AVG-1529","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1529"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4393","reference_id":"RHSA-2021:4393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4393"},{"reference_url":"https://usn.ubuntu.com/5454-1/","reference_id":"USN-5454-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5454-1/"},{"reference_url":"https://usn.ubuntu.com/5454-2/","reference_id":"USN-5454-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5454-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584493?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"}],"aliases":["CVE-2020-10001"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2chf-23mc-d3dn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57702?format=json","vulnerability_id":"VCID-35gf-189e-3ud4","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0313.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0313.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5029","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15162","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15343","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15412","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15354","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15277","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15126","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15133","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15191","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1523","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15228","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15172","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15037","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5029"},{"reference_url":"https://cups.org/str.php?L4455","reference_id":"","reference_type":"","scores":[],"url":"https://cups.org/str.php?L4455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"},{"reference_url":"http://secunia.com/advisories/60509","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60509"},{"reference_url":"http://secunia.com/advisories/60787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60787"},{"reference_url":"http://www.debian.org/security/2014/dsa-2990","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2990"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/22/13","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/22/13"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/22/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/22/2"},{"reference_url":"http://www.ubuntu.com/usn/USN-2341-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2341-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1122600","reference_id":"1122600","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1122600"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5029","reference_id":"CVE-2014-5029","reference_type":"","scores":[{"value":"1.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1388","reference_id":"RHSA-2014:1388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1388"},{"reference_url":"https://usn.ubuntu.com/2341-1/","reference_id":"USN-2341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2341-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036255?format=json","purl":"pkg:deb/debian/cups@1.7.5-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"}],"aliases":["CVE-2014-5029"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-35gf-189e-3ud4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59620?format=json","vulnerability_id":"VCID-3ame-feez-yqhc","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1158","reference_id":"","reference_type":"","scores":[{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99181","published_at":"2026-04-01T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99183","published_at":"2026-04-02T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99188","published_at":"2026-04-07T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99189","published_at":"2026-04-08T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.9919","published_at":"2026-04-16T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99193","published_at":"2026-04-24T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99195","published_at":"2026-04-29T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99198","published_at":"2026-05-05T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.992","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1221641","reference_id":"1221641","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1221641"},{"reference_url":"https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py","reference_id":"CVE-2015-1158","reference_type":"exploit","scores":[],"url":"https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py","reference_id":"CVE-2015-1158","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py"},{"reference_url":"http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html","reference_id":"CVE-2015-1158;OSVDB-123116","reference_type":"exploit","scores":[],"url":"http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt","reference_id":"CVE-2015-1158;OSVDB-123116","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt"},{"reference_url":"https://security.gentoo.org/glsa/201510-07","reference_id":"GLSA-201510-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201510-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1123","reference_id":"RHSA-2015:1123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1123"},{"reference_url":"https://usn.ubuntu.com/2629-1/","reference_id":"USN-2629-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2629-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036256?format=json","purl":"pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1037284?format=json","purl":"pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1"}],"aliases":["CVE-2015-1158"],"risk_score":1.4,"exploitability":"2.0","weighted_severity":"0.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ame-feez-yqhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68013?format=json","vulnerability_id":"VCID-3etj-2m21-ffa1","summary":"cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58364.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58364.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58364","reference_id":"","reference_type":"","scores":[{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.30003","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29955","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32467","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32388","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32436","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32463","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32429","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32439","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32668","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32735","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32857","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32875","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32781","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2393078","reference_id":"2393078","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2393078"},{"reference_url":"https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d","reference_id":"e58cba9d6fceed4242980e51dbd1302cf638ab1d","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-11T17:37:26Z/"}],"url":"https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d"},{"reference_url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4","reference_id":"GHSA-7qx3-r744-6qv4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-11T17:37:26Z/"}],"url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15700","reference_id":"RHSA-2025:15700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15701","reference_id":"RHSA-2025:15701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16590","reference_id":"RHSA-2025:16590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16591","reference_id":"RHSA-2025:16591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16592","reference_id":"RHSA-2025:16592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22063","reference_id":"RHSA-2025:22063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8814","reference_id":"RHSA-2026:8814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8814"},{"reference_url":"https://usn.ubuntu.com/7745-1/","reference_id":"USN-7745-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7745-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584494?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9"}],"aliases":["CVE-2025-58364"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3etj-2m21-ffa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94280?format=json","vulnerability_id":"VCID-44ju-8618-vqht","summary":"A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-8842","reference_id":"","reference_type":"","scores":[{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57558","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57528","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57612","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57633","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57609","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57663","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57661","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57641","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57671","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57645","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57603","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57623","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57602","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-8842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://usn.ubuntu.com/5454-1/","reference_id":"USN-5454-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5454-1/"},{"reference_url":"https://usn.ubuntu.com/5454-2/","reference_id":"USN-5454-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5454-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584493?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"}],"aliases":["CVE-2019-8842"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-44ju-8618-vqht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82676?format=json","vulnerability_id":"VCID-6mus-21kz-uuhz","summary":"cups: Session cookie generated by the CUPS web interface is easy to guess","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4300.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4300.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4300","reference_id":"","reference_type":"","scores":[{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59243","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59226","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59263","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59268","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.5925","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59231","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59195","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65668","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65554","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65598","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65649","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65602","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00492","scoring_system":"epss","scoring_elements":"0.65632","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4300"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/apple/cups/releases/tag/v2.2.10","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apple/cups/releases/tag/v2.2.10"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html"},{"reference_url":"http://www.securityfocus.com/bid/107785","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107785"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1695929","reference_id":"1695929","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1695929"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915909","reference_id":"915909","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915909"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4300","reference_id":"CVE-2018-4300","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1050","reference_id":"RHSA-2020:1050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1050"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038025?format=json","purl":"pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"}],"aliases":["CVE-2018-4300"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6mus-21kz-uuhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78840?format=json","vulnerability_id":"VCID-7wg4-sc9v-bffk","summary":"cups: Information leak through Cups-Get-Document operation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32360.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32360.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32360","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20097","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20037","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19884","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19963","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19992","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19934","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19921","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22443","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22539","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22537","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22548","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22709","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22526","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051953","reference_id":"1051953","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051953"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230495","reference_id":"2230495","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230495"},{"reference_url":"https://support.apple.com/en-us/HT213758","reference_id":"HT213758","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/"}],"url":"https://support.apple.com/en-us/HT213758"},{"reference_url":"https://support.apple.com/en-us/HT213759","reference_id":"HT213759","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/"}],"url":"https://support.apple.com/en-us/HT213759"},{"reference_url":"https://support.apple.com/en-us/HT213760","reference_id":"HT213760","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/"}],"url":"https://support.apple.com/en-us/HT213760"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4765","reference_id":"RHSA-2023:4765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4766","reference_id":"RHSA-2023:4766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4768","reference_id":"RHSA-2023:4768","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4768"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4769","reference_id":"RHSA-2023:4769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4770","reference_id":"RHSA-2023:4770","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4771","reference_id":"RHSA-2023:4771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4838","reference_id":"RHSA-2023:4838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4864","reference_id":"RHSA-2023:4864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4864"},{"reference_url":"https://usn.ubuntu.com/6361-1/","reference_id":"USN-6361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6361-1/"},{"reference_url":"https://usn.ubuntu.com/6361-2/","reference_id":"USN-6361-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6361-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584493?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"}],"aliases":["CVE-2023-32360"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7wg4-sc9v-bffk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68012?format=json","vulnerability_id":"VCID-993k-m3sq-gufu","summary":"cups: Authentication Bypass in CUPS Authorization Handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58060.json","reference_id":"","reference_type":"","scores":[{"value":"8.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58060.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58060","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15471","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15401","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16263","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16433","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16325","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16323","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16279","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16147","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16411","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16496","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16551","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16532","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16494","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16436","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16376","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16395","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2392595","reference_id":"2392595","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2392595"},{"reference_url":"https://github.com/OpenPrinting/cups/commit/595d691075b1d396d2edfaa0a8fd0873a0a1f221","reference_id":"595d691075b1d396d2edfaa0a8fd0873a0a1f221","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-11T17:33:32Z/"}],"url":"https://github.com/OpenPrinting/cups/commit/595d691075b1d396d2edfaa0a8fd0873a0a1f221"},{"reference_url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq","reference_id":"GHSA-4c68-qgrh-rmmq","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-11T17:33:32Z/"}],"url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15700","reference_id":"RHSA-2025:15700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15701","reference_id":"RHSA-2025:15701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15702","reference_id":"RHSA-2025:15702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16590","reference_id":"RHSA-2025:16590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16591","reference_id":"RHSA-2025:16591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16592","reference_id":"RHSA-2025:16592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17049","reference_id":"RHSA-2025:17049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17054","reference_id":"RHSA-2025:17054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17141","reference_id":"RHSA-2025:17141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17144","reference_id":"RHSA-2025:17144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17164","reference_id":"RHSA-2025:17164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0934","reference_id":"RHSA-2026:0934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0934"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:8814","reference_id":"RHSA-2026:8814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:8814"},{"reference_url":"https://usn.ubuntu.com/7745-1/","reference_id":"USN-7745-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7745-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584494?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9"}],"aliases":["CVE-2025-58060"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-993k-m3sq-gufu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73815?format=json","vulnerability_id":"VCID-am36-6m5v-fkba","summary":"cups: libppd: remote command injection via attacker controlled data in PPD file","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47175.json","reference_id":"","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47175.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47175","reference_id":"","reference_type":"","scores":[{"value":"0.33103","scoring_system":"epss","scoring_elements":"0.96927","published_at":"2026-05-07T12:55:00Z"},{"value":"0.33103","scoring_system":"epss","scoring_elements":"0.96878","published_at":"2026-04-04T12:55:00Z"},{"value":"0.33103","scoring_system":"epss","scoring_elements":"0.96883","published_at":"2026-04-07T12:55:00Z"},{"value":"0.33103","scoring_system":"epss","scoring_elements":"0.96891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.33103","scoring_system":"epss","scoring_elements":"0.96893","published_at":"2026-04-09T12:55:00Z"},{"value":"0.33103","scoring_system":"epss","scoring_elements":"0.96895","published_at":"2026-04-11T12:55:00Z"},{"value":"0.33103","scoring_system":"epss","scoring_elements":"0.96897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.33103","scoring_system":"epss","scoring_elements":"0.96898","published_at":"2026-04-13T12:55:00Z"},{"value":"0.33103","scoring_system":"epss","scoring_elements":"0.96905","published_at":"2026-04-16T12:55:00Z"},{"value":"0.33103","scoring_system":"epss","scoring_elements":"0.96909","published_at":"2026-04-18T12:55:00Z"},{"value":"0.33103","scoring_system":"epss","scoring_elements":"0.96919","published_at":"2026-04-29T12:55:00Z"},{"value":"0.33103","scoring_system":"epss","scoring_elements":"0.96923","published_at":"2026-05-05T12:55:00Z"},{"value":"0.33659","scoring_system":"epss","scoring_elements":"0.96918","published_at":"2026-04-02T12:55:00Z"},{"value":"0.33659","scoring_system":"epss","scoring_elements":"0.96955","published_at":"2026-04-24T12:55:00Z"},{"value":"0.33659","scoring_system":"epss","scoring_elements":"0.96957","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314256","reference_id":"2314256","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314256"},{"reference_url":"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I","reference_id":"Attacking-UNIX-systems-via-CUPS-Part-I","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/"}],"url":"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I"},{"reference_url":"https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6","reference_id":"GHSA-7xfx-47qg-grp6","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/"}],"url":"https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6"},{"reference_url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47","reference_id":"GHSA-p9rh-jxmq-gq47","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/"}],"url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47"},{"reference_url":"https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8","reference_id":"GHSA-rj88-6mr5-rcw8","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/"}],"url":"https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8"},{"reference_url":"https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5","reference_id":"GHSA-w63j-6g73-wmg5","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/"}],"url":"https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7346","reference_id":"RHSA-2024:7346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7461","reference_id":"RHSA-2024:7461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7462","reference_id":"RHSA-2024:7462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7463","reference_id":"RHSA-2024:7463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7503","reference_id":"RHSA-2024:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7504","reference_id":"RHSA-2024:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7506","reference_id":"RHSA-2024:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7551","reference_id":"RHSA-2024:7551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7553","reference_id":"RHSA-2024:7553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7623","reference_id":"RHSA-2024:7623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9470","reference_id":"RHSA-2024:9470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0083","reference_id":"RHSA-2025:0083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0083"},{"reference_url":"https://usn.ubuntu.com/7041-1/","reference_id":"USN-7041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7041-1/"},{"reference_url":"https://usn.ubuntu.com/7041-2/","reference_id":"USN-7041-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7041-2/"},{"reference_url":"https://usn.ubuntu.com/7041-3/","reference_id":"USN-7041-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7041-3/"},{"reference_url":"https://usn.ubuntu.com/7045-1/","reference_id":"USN-7045-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7045-1/"},{"reference_url":"https://www.cups.org","reference_id":"www.cups.org","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/"}],"url":"https://www.cups.org"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584494?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9"}],"aliases":["CVE-2024-47175"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-am36-6m5v-fkba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57701?format=json","vulnerability_id":"VCID-anr5-gc12-e7dr","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0313.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0313.html"},{"reference_url":"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3537","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16493","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16637","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16809","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16867","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16652","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16737","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16791","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16771","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16727","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16606","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16614","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16653","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16544","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16509","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16374","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"},{"reference_url":"http://secunia.com/advisories/59945","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59945"},{"reference_url":"http://secunia.com/advisories/60273","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60273"},{"reference_url":"http://secunia.com/advisories/60787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60787"},{"reference_url":"https://support.apple.com/kb/HT6535","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT6535"},{"reference_url":"http://www.cups.org/blog.php?L724","reference_id":"","reference_type":"","scores":[],"url":"http://www.cups.org/blog.php?L724"},{"reference_url":"http://www.cups.org/str.php?L4450","reference_id":"","reference_type":"","scores":[],"url":"http://www.cups.org/str.php?L4450"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"},{"reference_url":"http://www.securityfocus.com/bid/68788","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68788"},{"reference_url":"http://www.securitytracker.com/id/1030611","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030611"},{"reference_url":"http://www.ubuntu.com/usn/USN-2293-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2293-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1115576","reference_id":"1115576","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1115576"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3537","reference_id":"CVE-2014-3537","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1388","reference_id":"RHSA-2014:1388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1388"},{"reference_url":"https://usn.ubuntu.com/2293-1/","reference_id":"USN-2293-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2293-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036255?format=json","purl":"pkg:deb/debian/cups@1.7.5-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"}],"aliases":["CVE-2014-3537"],"risk_score":0.6,"exploitability":"0.5","weighted_severity":"1.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-anr5-gc12-e7dr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94174?format=json","vulnerability_id":"VCID-apyh-1uza-pffa","summary":"In array_find of array.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure in the printer spooler with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-111210196","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2228","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28106","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28179","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28017","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28128","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28134","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28091","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28033","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28043","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27895","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27783","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27707","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27536","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27597","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2228"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2228","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2228"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946782","reference_id":"946782","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946782"},{"reference_url":"https://usn.ubuntu.com/4340-1/","reference_id":"USN-4340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4340-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584493?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"}],"aliases":["CVE-2019-2228"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-apyh-1uza-pffa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31916?format=json","vulnerability_id":"VCID-aznw-8yer-xfhf","summary":"Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34241","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0979","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09768","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09785","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09816","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09807","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09686","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10737","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1147","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11548","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11662","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11703","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17165","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/06/26/1","reference_id":"1","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/06/26/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/06/23/10","reference_id":"10","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/06/23/10"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885","reference_id":"1038885","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2214914","reference_id":"2214914","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2214914"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/","reference_id":"7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/"},{"reference_url":"https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2","reference_id":"9809947a959e18409dcf562a3466ef246cb90cb2","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"}],"url":"https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2"},{"reference_url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25","reference_id":"GHSA-qjgh-5hcq-5f25","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"}],"url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25"},{"reference_url":"https://security.gentoo.org/glsa/202402-17","reference_id":"GLSA-202402-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-17"},{"reference_url":"https://support.apple.com/kb/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"}],"url":"https://support.apple.com/kb/HT213843"},{"reference_url":"https://support.apple.com/kb/HT213844","reference_id":"HT213844","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"}],"url":"https://support.apple.com/kb/HT213844"},{"reference_url":"https://support.apple.com/kb/HT213845","reference_id":"HT213845","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"}],"url":"https://support.apple.com/kb/HT213845"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html","reference_id":"msg00038.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6596","reference_id":"RHSA-2023:6596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7165","reference_id":"RHSA-2023:7165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1101","reference_id":"RHSA-2024:1101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1409","reference_id":"RHSA-2024:1409","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1409"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/","reference_id":"TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/"},{"reference_url":"https://usn.ubuntu.com/6184-1/","reference_id":"USN-6184-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6184-1/"},{"reference_url":"https://usn.ubuntu.com/6184-2/","reference_id":"USN-6184-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6184-2/"},{"reference_url":"https://github.com/OpenPrinting/cups/releases/tag/v2.4.6","reference_id":"v2.4.6","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"}],"url":"https://github.com/OpenPrinting/cups/releases/tag/v2.4.6"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584493?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"}],"aliases":["CVE-2023-34241"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aznw-8yer-xfhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34381?format=json","vulnerability_id":"VCID-bzht-vhe3-y7bf","summary":"Multiple vulnerabilities have been found in CUPS, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4180","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29801","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30171","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30128","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30056","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29941","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29872","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29735","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40957","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40864","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.409","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.4095","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40946","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40975","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html"},{"reference_url":"https://support.apple.com/HT208849","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208849"},{"reference_url":"https://www.debian.org/security/2018/dsa-4243","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4243"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607282","reference_id":"1607282","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607282"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4180","reference_id":"CVE-2018-4180","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4180"},{"reference_url":"https://security.gentoo.org/glsa/201908-08","reference_id":"GLSA-201908-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1050","reference_id":"RHSA-2020:1050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1050"},{"reference_url":"https://usn.ubuntu.com/3713-1/","reference_id":"USN-3713-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3713-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037285?format=json","purl":"pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1038025?format=json","purl":"pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"}],"aliases":["CVE-2018-4180"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bzht-vhe3-y7bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86391?format=json","vulnerability_id":"VCID-cf81-58ju-bqaz","summary":"cups: cross-site scripting flaw fixed in the 1.7.2 release","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2856.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2856.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2856","reference_id":"","reference_type":"","scores":[{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77324","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77331","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77359","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.7734","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.7737","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77379","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77406","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77385","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77422","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77414","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77448","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77456","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77467","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77475","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77502","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1087122","reference_id":"1087122","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1087122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1388","reference_id":"RHSA-2014:1388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1388"},{"reference_url":"https://usn.ubuntu.com/2172-1/","reference_id":"USN-2172-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2172-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036255?format=json","purl":"pkg:deb/debian/cups@1.7.5-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"}],"aliases":["CVE-2014-2856"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cf81-58ju-bqaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81400?format=json","vulnerability_id":"VCID-ev9c-v5dv-37fb","summary":"cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3898.json","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3898.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-3898","reference_id":"","reference_type":"","scores":[{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37102","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37269","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37296","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37125","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37177","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.3719","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37201","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37167","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.3714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37185","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37111","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36887","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36855","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36649","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36717","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-3898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823964","reference_id":"1823964","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1823964"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4469","reference_id":"RHSA-2020:4469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4469"},{"reference_url":"https://usn.ubuntu.com/4340-1/","reference_id":"USN-4340-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4340-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584493?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"}],"aliases":["CVE-2020-3898"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ev9c-v5dv-37fb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57703?format=json","vulnerability_id":"VCID-fby6-8f6z-63fw","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0313.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0313.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5030","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16015","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16109","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16354","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16153","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16239","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16304","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16286","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16247","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16134","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16061","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16059","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15902","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5030"},{"reference_url":"https://cups.org/str.php?L4455","reference_id":"","reference_type":"","scores":[],"url":"https://cups.org/str.php?L4455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"},{"reference_url":"http://secunia.com/advisories/60509","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60509"},{"reference_url":"http://secunia.com/advisories/60787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60787"},{"reference_url":"http://www.debian.org/security/2014/dsa-2990","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2990"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/22/13","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/22/13"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/22/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/22/2"},{"reference_url":"http://www.ubuntu.com/usn/USN-2341-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2341-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128764","reference_id":"1128764","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128764"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5030","reference_id":"CVE-2014-5030","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1388","reference_id":"RHSA-2014:1388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1388"},{"reference_url":"https://usn.ubuntu.com/2341-1/","reference_id":"USN-2341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2341-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036255?format=json","purl":"pkg:deb/debian/cups@1.7.5-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"}],"aliases":["CVE-2014-5030"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fby6-8f6z-63fw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83888?format=json","vulnerability_id":"VCID-fkyp-m1p9-mfhy","summary":"cups: Invalid usernames handled in scheduler/ipp.c:add_job() allow remote attackers to cause a denial of service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18248.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18248.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18248","reference_id":"","reference_type":"","scores":[{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.76945","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.76951","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.7698","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.76994","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77006","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77034","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77012","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77009","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.7705","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77052","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77044","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77079","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77086","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.771","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77108","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77137","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18248"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18248","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18248"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1561296","reference_id":"1561296","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1561296"},{"reference_url":"https://usn.ubuntu.com/3713-1/","reference_id":"USN-3713-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3713-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038025?format=json","purl":"pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"}],"aliases":["CVE-2017-18248"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fkyp-m1p9-mfhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75351?format=json","vulnerability_id":"VCID-k4yw-jg6v-1bcc","summary":"cups: Cupsd Listen arbitrary chmod 0140777","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35235.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35235.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-35235","reference_id":"","reference_type":"","scores":[{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.8689","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86776","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86773","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86793","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86802","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86815","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86811","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86807","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86822","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86825","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86841","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86848","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03102","scoring_system":"epss","scoring_elements":"0.86872","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-35235"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/06/11/1","reference_id":"1","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/06/11/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073002","reference_id":"1073002","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073002"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2290318","reference_id":"2290318","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2290318"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/06/12/4","reference_id":"4","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/06/12/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/06/12/5","reference_id":"5","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/06/12/5"},{"reference_url":"https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d","reference_id":"ff1f8a623e090dee8a8aadf12a6a4b25efac143d","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"}],"url":"https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d"},{"reference_url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f","reference_id":"GHSA-vvwp-mv6j-hw6f","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"}],"url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f"},{"reference_url":"https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240","reference_id":"http-addr.c#L229-L240","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"}],"url":"https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html","reference_id":"msg00001.html","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4265","reference_id":"RHSA-2024:4265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4580","reference_id":"RHSA-2024:4580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4715","reference_id":"RHSA-2024:4715","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4715"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4776","reference_id":"RHSA-2024:4776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4776"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5644","reference_id":"RHSA-2024:5644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5644"},{"reference_url":"https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21","reference_id":"user-tmp#n21","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"}],"url":"https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21"},{"reference_url":"https://usn.ubuntu.com/6844-1/","reference_id":"USN-6844-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6844-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584493?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"}],"aliases":["CVE-2024-35235"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k4yw-jg6v-1bcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31913?format=json","vulnerability_id":"VCID-p8gy-dd3u-uqh4","summary":"Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26691","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09443","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09492","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10972","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10974","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10942","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10782","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10876","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10835","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10773","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10717","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10851","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10841","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10917","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c"},{"reference_url":"https://support.apple.com/en-us/HT213183","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/en-us/HT213183"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769","reference_id":"1011769","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084321","reference_id":"2084321","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2084321"},{"reference_url":"https://security.gentoo.org/glsa/202402-17","reference_id":"GLSA-202402-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4990","reference_id":"RHSA-2022:4990","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4990"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5054","reference_id":"RHSA-2022:5054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5055","reference_id":"RHSA-2022:5055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5056","reference_id":"RHSA-2022:5056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5057","reference_id":"RHSA-2022:5057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5057"},{"reference_url":"https://usn.ubuntu.com/5454-1/","reference_id":"USN-5454-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5454-1/"},{"reference_url":"https://usn.ubuntu.com/5454-2/","reference_id":"USN-5454-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5454-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038025?format=json","purl":"pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/584493?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"}],"aliases":["CVE-2022-26691"," MNDT-2022-0026"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p8gy-dd3u-uqh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83662?format=json","vulnerability_id":"VCID-pwkd-sgtt-1bef","summary":"cups: DNS rebinding attacks via incorrect whitelist","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18190.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18190.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18190","reference_id":"","reference_type":"","scores":[{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71939","published_at":"2026-04-01T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71966","published_at":"2026-04-04T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71981","published_at":"2026-04-08T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71993","published_at":"2026-04-09T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72017","published_at":"2026-04-11T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72001","published_at":"2026-04-12T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.71985","published_at":"2026-04-13T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72026","published_at":"2026-04-16T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72034","published_at":"2026-04-18T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72018","published_at":"2026-04-21T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72063","published_at":"2026-04-29T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.7207","published_at":"2026-04-26T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72056","published_at":"2026-05-05T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72088","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18190"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1546395","reference_id":"1546395","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1546395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3864","reference_id":"RHSA-2020:3864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3864"},{"reference_url":"https://usn.ubuntu.com/3577-1/","reference_id":"USN-3577-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3577-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038025?format=json","purl":"pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"}],"aliases":["CVE-2017-18190"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pwkd-sgtt-1bef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31915?format=json","vulnerability_id":"VCID-q8a8-fd7r-1kg7","summary":"Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32324","reference_id":"","reference_type":"","scores":[{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46866","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46907","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46883","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4683","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46885","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4688","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46887","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49235","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49202","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49182","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49279","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49246","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49244","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49119","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-32324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2209603","reference_id":"2209603","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2209603"},{"reference_url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7","reference_id":"GHSA-cxc6-w2g7-69p7","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/"}],"url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7"},{"reference_url":"https://security.gentoo.org/glsa/202402-17","reference_id":"GLSA-202402-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html","reference_id":"msg00001.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6596","reference_id":"RHSA-2023:6596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7165","reference_id":"RHSA-2023:7165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1101","reference_id":"RHSA-2024:1101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1409","reference_id":"RHSA-2024:1409","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1409"},{"reference_url":"https://usn.ubuntu.com/6128-1/","reference_id":"USN-6128-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6128-1/"},{"reference_url":"https://usn.ubuntu.com/6128-2/","reference_id":"USN-6128-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6128-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584493?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"}],"aliases":["CVE-2023-32324"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8a8-fd7r-1kg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94170?format=json","vulnerability_id":"VCID-qxwq-vp9g-ukca","summary":"In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2180","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0399","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03973","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0383","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03868","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03878","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03892","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03897","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03922","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0389","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03871","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03845","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03824","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03833","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03953","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03967","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04015","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2180"},{"reference_url":"https://source.android.com/security/bulletin/2019-09-01","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/2019-09-01"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957","reference_id":"934957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2180","reference_id":"CVE-2019-2180","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2180"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584493?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"}],"aliases":["CVE-2019-2180"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qxwq-vp9g-ukca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59622?format=json","vulnerability_id":"VCID-ucmb-we3r-aqcd","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1159","reference_id":"","reference_type":"","scores":[{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98202","published_at":"2026-04-01T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98206","published_at":"2026-04-02T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.9821","published_at":"2026-04-04T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98211","published_at":"2026-04-07T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98216","published_at":"2026-04-09T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.9822","published_at":"2026-04-11T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98219","published_at":"2026-04-13T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98225","published_at":"2026-04-16T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98227","published_at":"2026-04-18T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98224","published_at":"2026-04-21T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98228","published_at":"2026-04-29T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98234","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1221642","reference_id":"1221642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1221642"},{"reference_url":"https://security.gentoo.org/glsa/201510-07","reference_id":"GLSA-201510-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201510-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1123","reference_id":"RHSA-2015:1123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1123"},{"reference_url":"https://usn.ubuntu.com/2629-1/","reference_id":"USN-2629-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2629-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036256?format=json","purl":"pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1037284?format=json","purl":"pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1"}],"aliases":["CVE-2015-1159"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ucmb-we3r-aqcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36514?format=json","vulnerability_id":"VCID-ukec-69r2-xbef","summary":"A buffer overflow in CUPS might allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9679","reference_id":"","reference_type":"","scores":[{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91758","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91673","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91682","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91696","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91709","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91715","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91719","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91721","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91738","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.9173","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91734","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91745","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9679"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191588","reference_id":"1191588","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191588"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387","reference_id":"778387","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387"},{"reference_url":"https://security.gentoo.org/glsa/201607-06","reference_id":"GLSA-201607-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1123","reference_id":"RHSA-2015:1123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1123"},{"reference_url":"https://usn.ubuntu.com/2520-1/","reference_id":"USN-2520-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2520-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036255?format=json","purl":"pkg:deb/debian/cups@1.7.5-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"}],"aliases":["CVE-2014-9679"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ukec-69r2-xbef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31914?format=json","vulnerability_id":"VCID-vx54-r2dt-8ue5","summary":"Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4504","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10442","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10494","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10354","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10522","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10489","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10466","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10334","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10437","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10352","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10297","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238509","reference_id":"2238509","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238509"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/","reference_id":"5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/","reference_id":"5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/","reference_id":"AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/"},{"reference_url":"https://takeonme.org/cves/CVE-2023-4504.html","reference_id":"CVE-2023-4504.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"}],"url":"https://takeonme.org/cves/CVE-2023-4504.html"},{"reference_url":"https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6","reference_id":"GHSA-4f65-6ph5-qwh6","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"}],"url":"https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6"},{"reference_url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h","reference_id":"GHSA-pf5r-86w9-678h","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"}],"url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h"},{"reference_url":"https://security.gentoo.org/glsa/202402-17","reference_id":"GLSA-202402-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html","reference_id":"msg00041.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/","reference_id":"PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/","reference_id":"T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/"},{"reference_url":"https://usn.ubuntu.com/6391-1/","reference_id":"USN-6391-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6391-1/"},{"reference_url":"https://usn.ubuntu.com/6391-2/","reference_id":"USN-6391-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6391-2/"},{"reference_url":"https://usn.ubuntu.com/6392-1/","reference_id":"USN-6392-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6392-1/"},{"reference_url":"https://github.com/OpenPrinting/cups/releases/tag/v2.4.7","reference_id":"v2.4.7","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"}],"url":"https://github.com/OpenPrinting/cups/releases/tag/v2.4.7"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584493?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"}],"aliases":["CVE-2023-4504"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vx54-r2dt-8ue5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34382?format=json","vulnerability_id":"VCID-w17y-dvuq-7ba6","summary":"Multiple vulnerabilities have been found in CUPS, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4181","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27508","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27951","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27959","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27942","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27893","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27807","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27621","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27448","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39512","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39474","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39331","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39431","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39486","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39501","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39517","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html"},{"reference_url":"https://support.apple.com/HT208849","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208849"},{"reference_url":"https://www.debian.org/security/2018/dsa-4243","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4243"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607291","reference_id":"1607291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607291"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4181","reference_id":"CVE-2018-4181","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:N/A:N"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4181"},{"reference_url":"https://security.gentoo.org/glsa/201908-08","reference_id":"GLSA-201908-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1050","reference_id":"RHSA-2020:1050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1050"},{"reference_url":"https://usn.ubuntu.com/3713-1/","reference_id":"USN-3713-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3713-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037285?format=json","purl":"pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1038025?format=json","purl":"pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"}],"aliases":["CVE-2018-4181"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w17y-dvuq-7ba6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86418?format=json","vulnerability_id":"VCID-wjht-u5u1-kkas","summary":"cups: lppasswd vulnerability allows data access to unprivileged user","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6891.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6891.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6891","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1417","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14305","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14197","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14251","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14098","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14068","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14106","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14011","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13889","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14046","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6891"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6891","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6891"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1051645","reference_id":"1051645","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1051645"},{"reference_url":"https://usn.ubuntu.com/2082-1/","reference_id":"USN-2082-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2082-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036255?format=json","purl":"pkg:deb/debian/cups@1.7.5-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"}],"aliases":["CVE-2013-6891"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wjht-u5u1-kkas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82264?format=json","vulnerability_id":"VCID-wqu4-wys6-hfbb","summary":"cups: stack-buffer-overflow in libcups's asn1_get_type function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8675.json","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8675.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-8675","reference_id":"","reference_type":"","scores":[{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80524","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80553","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80545","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80574","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80584","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80601","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80587","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80607","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.8061","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80613","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80638","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80641","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80657","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80675","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80697","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-8675"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1738455","reference_id":"1738455","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1738455"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957","reference_id":"934957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1765","reference_id":"RHSA-2020:1765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3864","reference_id":"RHSA-2020:3864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3864"},{"reference_url":"https://usn.ubuntu.com/4105-1/","reference_id":"USN-4105-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4105-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584493?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"}],"aliases":["CVE-2019-8675"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wqu4-wys6-hfbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57704?format=json","vulnerability_id":"VCID-yyrd-qt22-w3f5","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0313.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0313.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5031","reference_id":"","reference_type":"","scores":[{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81924","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81742","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81752","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81772","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81799","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81805","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81825","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81812","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81807","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81844","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81845","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81871","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81881","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81886","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81904","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5031"},{"reference_url":"https://cups.org/str.php?L4455","reference_id":"","reference_type":"","scores":[],"url":"https://cups.org/str.php?L4455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"},{"reference_url":"http://secunia.com/advisories/60509","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60509"},{"reference_url":"http://secunia.com/advisories/60787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60787"},{"reference_url":"http://www.debian.org/security/2014/dsa-2990","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2990"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/22/13","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/22/13"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/22/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/22/2"},{"reference_url":"http://www.ubuntu.com/usn/USN-2341-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2341-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128767","reference_id":"1128767","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128767"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5031","reference_id":"CVE-2014-5031","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1388","reference_id":"RHSA-2014:1388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1388"},{"reference_url":"https://usn.ubuntu.com/2341-1/","reference_id":"USN-2341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2341-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036255?format=json","purl":"pkg:deb/debian/cups@1.7.5-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"}],"aliases":["CVE-2014-5031"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yyrd-qt22-w3f5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34380?format=json","vulnerability_id":"VCID-zjj3-g2d7-c3gd","summary":"Multiple vulnerabilities have been found in CUPS, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15400","reference_id":"","reference_type":"","scores":[{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.6126","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.6134","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61369","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61338","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61385","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61401","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61422","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61407","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61388","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61427","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61431","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61413","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61415","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61409","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61361","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61411","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607288","reference_id":"1607288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607288"},{"reference_url":"https://security.gentoo.org/glsa/201908-08","reference_id":"GLSA-201908-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-08"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037285?format=json","purl":"pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1038025?format=json","purl":"pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"}],"aliases":["CVE-2017-15400"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zjj3-g2d7-c3gd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34386?format=json","vulnerability_id":"VCID-zt43-htwu-kfde","summary":"Multiple vulnerabilities have been found in CUPS, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6553","reference_id":"","reference_type":"","scores":[{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34985","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35183","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35212","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35093","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35163","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35133","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35145","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35131","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.3485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34833","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34743","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34615","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34688","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607285","reference_id":"1607285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607285"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605","reference_id":"903605","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605"},{"reference_url":"https://security.gentoo.org/glsa/201908-08","reference_id":"GLSA-201908-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-08"},{"reference_url":"https://usn.ubuntu.com/3713-1/","reference_id":"USN-3713-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3713-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037285?format=json","purl":"pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1038025?format=json","purl":"pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"}],"aliases":["CVE-2018-6553"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zt43-htwu-kfde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82265?format=json","vulnerability_id":"VCID-zxp7-6d69-tfhm","summary":"cups: stack-buffer-overflow in libcups's asn1_get_packed function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8696.json","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8696.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-8696","reference_id":"","reference_type":"","scores":[{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80524","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80553","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80545","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80574","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80584","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80601","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80587","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80607","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.8061","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80613","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80638","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80641","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80657","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80675","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80697","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-8696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1738497","reference_id":"1738497","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1738497"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957","reference_id":"934957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1765","reference_id":"RHSA-2020:1765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3864","reference_id":"RHSA-2020:3864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3864"},{"reference_url":"https://usn.ubuntu.com/4105-1/","reference_id":"USN-4105-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4105-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584493?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"}],"aliases":["CVE-2019-8696"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zxp7-6d69-tfhm"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57702?format=json","vulnerability_id":"VCID-35gf-189e-3ud4","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0313.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0313.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5029","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15162","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15306","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15343","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15412","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15354","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15277","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15126","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15133","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15191","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1523","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15228","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15172","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15037","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5029"},{"reference_url":"https://cups.org/str.php?L4455","reference_id":"","reference_type":"","scores":[],"url":"https://cups.org/str.php?L4455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"},{"reference_url":"http://secunia.com/advisories/60509","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60509"},{"reference_url":"http://secunia.com/advisories/60787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60787"},{"reference_url":"http://www.debian.org/security/2014/dsa-2990","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2990"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/22/13","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/22/13"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/22/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/22/2"},{"reference_url":"http://www.ubuntu.com/usn/USN-2341-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2341-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1122600","reference_id":"1122600","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1122600"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5029","reference_id":"CVE-2014-5029","reference_type":"","scores":[{"value":"1.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1388","reference_id":"RHSA-2014:1388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1388"},{"reference_url":"https://usn.ubuntu.com/2341-1/","reference_id":"USN-2341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2341-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1036255?format=json","purl":"pkg:deb/debian/cups@1.7.5-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"}],"aliases":["CVE-2014-5029"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-35gf-189e-3ud4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48145?format=json","vulnerability_id":"VCID-39f1-22a5-c7aw","summary":"Multiple vulnerabilities have been found in cups-filters, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3258","reference_id":"","reference_type":"","scores":[{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97131","published_at":"2026-04-01T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97154","published_at":"2026-04-08T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97159","published_at":"2026-04-11T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.9716","published_at":"2026-04-12T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97161","published_at":"2026-04-13T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97169","published_at":"2026-04-16T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.9717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97174","published_at":"2026-04-21T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97175","published_at":"2026-04-24T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97176","published_at":"2026-04-26T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97178","published_at":"2026-04-29T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97183","published_at":"2026-05-05T12:55:00Z"},{"value":"0.37078","scoring_system":"epss","scoring_elements":"0.97187","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1235385","reference_id":"1235385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1235385"},{"reference_url":"https://security.gentoo.org/glsa/201510-08","reference_id":"GLSA-201510-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201510-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2360","reference_id":"RHSA-2015:2360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2360"},{"reference_url":"https://usn.ubuntu.com/2659-1/","reference_id":"USN-2659-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2659-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"}],"aliases":["CVE-2015-3258"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-39f1-22a5-c7aw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59620?format=json","vulnerability_id":"VCID-3ame-feez-yqhc","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1158","reference_id":"","reference_type":"","scores":[{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99181","published_at":"2026-04-01T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99183","published_at":"2026-04-02T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99188","published_at":"2026-04-07T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99189","published_at":"2026-04-08T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.9919","published_at":"2026-04-16T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99193","published_at":"2026-04-24T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99195","published_at":"2026-04-29T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.99198","published_at":"2026-05-05T12:55:00Z"},{"value":"0.81706","scoring_system":"epss","scoring_elements":"0.992","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1221641","reference_id":"1221641","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1221641"},{"reference_url":"https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py","reference_id":"CVE-2015-1158","reference_type":"exploit","scores":[],"url":"https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py","reference_id":"CVE-2015-1158","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py"},{"reference_url":"http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html","reference_id":"CVE-2015-1158;OSVDB-123116","reference_type":"exploit","scores":[],"url":"http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt","reference_id":"CVE-2015-1158;OSVDB-123116","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt"},{"reference_url":"https://security.gentoo.org/glsa/201510-07","reference_id":"GLSA-201510-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201510-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1123","reference_id":"RHSA-2015:1123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1123"},{"reference_url":"https://usn.ubuntu.com/2629-1/","reference_id":"USN-2629-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2629-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1036256?format=json","purl":"pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1037284?format=json","purl":"pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1"}],"aliases":["CVE-2015-1158"],"risk_score":1.4,"exploitability":"2.0","weighted_severity":"0.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ame-feez-yqhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33707?format=json","vulnerability_id":"VCID-48ht-j7ga-9ugq","summary":"Multiple vulnerabilities have been found in CUPS, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3170.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3170.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3170","reference_id":"","reference_type":"","scores":[{"value":"0.09148","scoring_system":"epss","scoring_elements":"0.92649","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09148","scoring_system":"epss","scoring_elements":"0.92656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09148","scoring_system":"epss","scoring_elements":"0.92662","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09148","scoring_system":"epss","scoring_elements":"0.92673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09148","scoring_system":"epss","scoring_elements":"0.92677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09148","scoring_system":"epss","scoring_elements":"0.92683","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09148","scoring_system":"epss","scoring_elements":"0.92682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09148","scoring_system":"epss","scoring_elements":"0.92696","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09148","scoring_system":"epss","scoring_elements":"0.927","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09148","scoring_system":"epss","scoring_elements":"0.92703","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09148","scoring_system":"epss","scoring_elements":"0.92698","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09148","scoring_system":"epss","scoring_elements":"0.92707","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09148","scoring_system":"epss","scoring_elements":"0.92721","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=732106","reference_id":"732106","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=732106"},{"reference_url":"https://security.gentoo.org/glsa/201207-10","reference_id":"GLSA-201207-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201207-10"},{"reference_url":"https://usn.ubuntu.com/1207-1/","reference_id":"USN-1207-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1207-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"}],"aliases":["CVE-2011-3170"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-48ht-j7ga-9ugq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32182?format=json","vulnerability_id":"VCID-4bxg-5tnm-y3hw","summary":"Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6476","reference_id":"","reference_type":"","scores":[{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.5254","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52578","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52624","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52674","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52642","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.5268","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52687","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52671","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52622","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52632","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52595","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52537","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.5259","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318","reference_id":"741318","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333","reference_id":"741333","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333"},{"reference_url":"https://security.gentoo.org/glsa/201406-16","reference_id":"GLSA-201406-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-16"},{"reference_url":"https://usn.ubuntu.com/2143-1/","reference_id":"USN-2143-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2143-1/"},{"reference_url":"https://usn.ubuntu.com/2144-1/","reference_id":"USN-2144-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2144-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"}],"aliases":["CVE-2013-6476"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4bxg-5tnm-y3hw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32179?format=json","vulnerability_id":"VCID-843p-8xve-nfer","summary":"Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6474","reference_id":"","reference_type":"","scores":[{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95567","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95576","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95581","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95597","published_at":"2026-04-11T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95609","published_at":"2026-04-16T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95613","published_at":"2026-04-21T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95614","published_at":"2026-04-24T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95616","published_at":"2026-04-26T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95615","published_at":"2026-04-29T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95632","published_at":"2026-05-05T12:55:00Z"},{"value":"0.20771","scoring_system":"epss","scoring_elements":"0.95635","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6474"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318","reference_id":"741318","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333","reference_id":"741333","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333"},{"reference_url":"https://security.gentoo.org/glsa/201406-16","reference_id":"GLSA-201406-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-16"},{"reference_url":"https://usn.ubuntu.com/2143-1/","reference_id":"USN-2143-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2143-1/"},{"reference_url":"https://usn.ubuntu.com/2144-1/","reference_id":"USN-2144-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2144-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"}],"aliases":["CVE-2013-6474"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-843p-8xve-nfer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57701?format=json","vulnerability_id":"VCID-anr5-gc12-e7dr","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0313.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0313.html"},{"reference_url":"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3537","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16493","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16637","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16809","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16867","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16652","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16737","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16791","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16771","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16727","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16606","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16614","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16653","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16544","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16509","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16374","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"},{"reference_url":"http://secunia.com/advisories/59945","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59945"},{"reference_url":"http://secunia.com/advisories/60273","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60273"},{"reference_url":"http://secunia.com/advisories/60787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60787"},{"reference_url":"https://support.apple.com/kb/HT6535","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT6535"},{"reference_url":"http://www.cups.org/blog.php?L724","reference_id":"","reference_type":"","scores":[],"url":"http://www.cups.org/blog.php?L724"},{"reference_url":"http://www.cups.org/str.php?L4450","reference_id":"","reference_type":"","scores":[],"url":"http://www.cups.org/str.php?L4450"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"},{"reference_url":"http://www.securityfocus.com/bid/68788","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68788"},{"reference_url":"http://www.securitytracker.com/id/1030611","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030611"},{"reference_url":"http://www.ubuntu.com/usn/USN-2293-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2293-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1115576","reference_id":"1115576","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1115576"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3537","reference_id":"CVE-2014-3537","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1388","reference_id":"RHSA-2014:1388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1388"},{"reference_url":"https://usn.ubuntu.com/2293-1/","reference_id":"USN-2293-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2293-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1036255?format=json","purl":"pkg:deb/debian/cups@1.7.5-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"}],"aliases":["CVE-2014-3537"],"risk_score":0.6,"exploitability":"0.5","weighted_severity":"1.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-anr5-gc12-e7dr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48146?format=json","vulnerability_id":"VCID-ed99-uccv-d7bh","summary":"Multiple vulnerabilities have been found in cups-filters, the worst\n    of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3279","reference_id":"","reference_type":"","scores":[{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96967","published_at":"2026-04-01T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96975","published_at":"2026-04-02T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96979","published_at":"2026-04-04T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96981","published_at":"2026-04-07T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.9699","published_at":"2026-04-08T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96991","published_at":"2026-04-09T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96993","published_at":"2026-04-11T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.96995","published_at":"2026-04-13T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97004","published_at":"2026-04-16T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97007","published_at":"2026-04-18T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.9701","published_at":"2026-04-21T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97011","published_at":"2026-04-24T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97015","published_at":"2026-04-29T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97018","published_at":"2026-05-05T12:55:00Z"},{"value":"0.34505","scoring_system":"epss","scoring_elements":"0.97022","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3279"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1238990","reference_id":"1238990","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1238990"},{"reference_url":"https://security.gentoo.org/glsa/201510-08","reference_id":"GLSA-201510-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201510-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2360","reference_id":"RHSA-2015:2360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2360"},{"reference_url":"https://usn.ubuntu.com/2659-1/","reference_id":"USN-2659-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2659-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"}],"aliases":["CVE-2015-3279"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ed99-uccv-d7bh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57703?format=json","vulnerability_id":"VCID-fby6-8f6z-63fw","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0313.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0313.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5030","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16015","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16109","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16354","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16153","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16239","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16304","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16286","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16247","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16134","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16061","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16059","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15902","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5030"},{"reference_url":"https://cups.org/str.php?L4455","reference_id":"","reference_type":"","scores":[],"url":"https://cups.org/str.php?L4455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"},{"reference_url":"http://secunia.com/advisories/60509","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60509"},{"reference_url":"http://secunia.com/advisories/60787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60787"},{"reference_url":"http://www.debian.org/security/2014/dsa-2990","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2990"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/22/13","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/22/13"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/22/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/22/2"},{"reference_url":"http://www.ubuntu.com/usn/USN-2341-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2341-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128764","reference_id":"1128764","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128764"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5030","reference_id":"CVE-2014-5030","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1388","reference_id":"RHSA-2014:1388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1388"},{"reference_url":"https://usn.ubuntu.com/2341-1/","reference_id":"USN-2341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2341-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1036255?format=json","purl":"pkg:deb/debian/cups@1.7.5-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"}],"aliases":["CVE-2014-5030"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fby6-8f6z-63fw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32181?format=json","vulnerability_id":"VCID-mcmb-bvw9-dba5","summary":"Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6475","reference_id":"","reference_type":"","scores":[{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95557","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95566","published_at":"2026-04-02T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95573","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.9558","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95583","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95589","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.9559","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95599","published_at":"2026-04-16T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95604","published_at":"2026-04-21T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95605","published_at":"2026-04-29T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95622","published_at":"2026-05-05T12:55:00Z"},{"value":"0.20679","scoring_system":"epss","scoring_elements":"0.95625","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1027550","reference_id":"1027550","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1027550"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318","reference_id":"741318","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333","reference_id":"741333","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333"},{"reference_url":"https://security.gentoo.org/glsa/201406-16","reference_id":"GLSA-201406-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-16"},{"reference_url":"https://usn.ubuntu.com/2143-1/","reference_id":"USN-2143-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2143-1/"},{"reference_url":"https://usn.ubuntu.com/2144-1/","reference_id":"USN-2144-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2144-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"}],"aliases":["CVE-2013-6475"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mcmb-bvw9-dba5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41478?format=json","vulnerability_id":"VCID-mtzd-538p-kbhm","summary":"A vulnerability in CUPS may allow for arbitrary file access.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791"},{"reference_url":"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0580.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0580.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5519.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5519.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5519","reference_id":"","reference_type":"","scores":[{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93193","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93114","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93127","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93126","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93134","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93144","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93143","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93159","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93164","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93171","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93176","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93172","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10228","scoring_system":"epss","scoring_elements":"0.93179","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80012","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80012"},{"reference_url":"http://support.apple.com/kb/HT5784","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT5784"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/11/10/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/11/10/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/11/11/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/11/11/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/11/11/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/11/11/5"},{"reference_url":"http://www.securityfocus.com/bid/56494","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/56494"},{"reference_url":"http://www.ubuntu.com/usn/USN-1654-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1654-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791","reference_id":"692791","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=875898","reference_id":"875898","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=875898"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5519","reference_id":"CVE-2012-5519","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5519"},{"reference_url":"https://security.gentoo.org/glsa/201404-01","reference_id":"GLSA-201404-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0580","reference_id":"RHSA-2013:0580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0580"},{"reference_url":"https://usn.ubuntu.com/1654-1/","reference_id":"USN-1654-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1654-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"}],"aliases":["CVE-2012-5519"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mtzd-538p-kbhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59622?format=json","vulnerability_id":"VCID-ucmb-we3r-aqcd","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1159","reference_id":"","reference_type":"","scores":[{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98202","published_at":"2026-04-01T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98206","published_at":"2026-04-02T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.9821","published_at":"2026-04-04T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98211","published_at":"2026-04-07T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98216","published_at":"2026-04-09T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.9822","published_at":"2026-04-11T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98219","published_at":"2026-04-13T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98225","published_at":"2026-04-16T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98227","published_at":"2026-04-18T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98224","published_at":"2026-04-21T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98228","published_at":"2026-04-29T12:55:00Z"},{"value":"0.58776","scoring_system":"epss","scoring_elements":"0.98234","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1221642","reference_id":"1221642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1221642"},{"reference_url":"https://security.gentoo.org/glsa/201510-07","reference_id":"GLSA-201510-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201510-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1123","reference_id":"RHSA-2015:1123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1123"},{"reference_url":"https://usn.ubuntu.com/2629-1/","reference_id":"USN-2629-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2629-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1036256?format=json","purl":"pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1037284?format=json","purl":"pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1"}],"aliases":["CVE-2015-1159"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ucmb-we3r-aqcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36514?format=json","vulnerability_id":"VCID-ukec-69r2-xbef","summary":"A buffer overflow in CUPS might allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9679","reference_id":"","reference_type":"","scores":[{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91758","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91673","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91682","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91696","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91709","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91715","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91719","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91721","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91738","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.9173","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91734","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07364","scoring_system":"epss","scoring_elements":"0.91745","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9679"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191588","reference_id":"1191588","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191588"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387","reference_id":"778387","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387"},{"reference_url":"https://security.gentoo.org/glsa/201607-06","reference_id":"GLSA-201607-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201607-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1123","reference_id":"RHSA-2015:1123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1123"},{"reference_url":"https://usn.ubuntu.com/2520-1/","reference_id":"USN-2520-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2520-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1036255?format=json","purl":"pkg:deb/debian/cups@1.7.5-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"}],"aliases":["CVE-2014-9679"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ukec-69r2-xbef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56772?format=json","vulnerability_id":"VCID-y7a9-2p1n-z7fx","summary":"Multiple vulnerabilities have been found in GIMP, the worst of\n    which allow execution of arbitrary code or Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2896.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2896.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2896","reference_id":"","reference_type":"","scores":[{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.9157","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91584","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91593","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91606","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91612","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91616","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91618","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91615","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91637","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.9163","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91629","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91636","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91635","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91632","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91645","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07216","scoring_system":"epss","scoring_elements":"0.91658","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2896"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643753","reference_id":"643753","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643753"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=727800","reference_id":"727800","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=727800"},{"reference_url":"https://security.gentoo.org/glsa/201209-23","reference_id":"GLSA-201209-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1635","reference_id":"RHSA-2011:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0302","reference_id":"RHSA-2012:0302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1180","reference_id":"RHSA-2012:1180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1181","reference_id":"RHSA-2012:1181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1181"},{"reference_url":"https://usn.ubuntu.com/1207-1/","reference_id":"USN-1207-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1207-1/"},{"reference_url":"https://usn.ubuntu.com/1214-1/","reference_id":"USN-1214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1214-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"}],"aliases":["CVE-2011-2896"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y7a9-2p1n-z7fx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57704?format=json","vulnerability_id":"VCID-yyrd-qt22-w3f5","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0313.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0313.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1388.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5031","reference_id":"","reference_type":"","scores":[{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81924","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81742","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81752","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81772","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81799","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81805","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81825","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81812","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81807","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81844","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81845","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81871","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81881","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81886","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01618","scoring_system":"epss","scoring_elements":"0.81904","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5031"},{"reference_url":"https://cups.org/str.php?L4455","reference_id":"","reference_type":"","scores":[],"url":"https://cups.org/str.php?L4455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"},{"reference_url":"http://secunia.com/advisories/60509","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60509"},{"reference_url":"http://secunia.com/advisories/60787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60787"},{"reference_url":"http://www.debian.org/security/2014/dsa-2990","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2990"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/22/13","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/22/13"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/22/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/22/2"},{"reference_url":"http://www.ubuntu.com/usn/USN-2341-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2341-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128767","reference_id":"1128767","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128767"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5031","reference_id":"CVE-2014-5031","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1388","reference_id":"RHSA-2014:1388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1388"},{"reference_url":"https://usn.ubuntu.com/2341-1/","reference_id":"USN-2341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2341-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571555?format=json","purl":"pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-35gf-189e-3ud4"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-anr5-gc12-e7dr"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-cf81-58ju-bqaz"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fby6-8f6z-63fw"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-ukec-69r2-xbef"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wjht-u5u1-kkas"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-yyrd-qt22-w3f5"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"},{"url":"http://public2.vulnerablecode.io/api/packages/1036255?format=json","purl":"pkg:deb/debian/cups@1.7.5-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2chf-23mc-d3dn"},{"vulnerability":"VCID-3ame-feez-yqhc"},{"vulnerability":"VCID-3etj-2m21-ffa1"},{"vulnerability":"VCID-44ju-8618-vqht"},{"vulnerability":"VCID-6mus-21kz-uuhz"},{"vulnerability":"VCID-7wg4-sc9v-bffk"},{"vulnerability":"VCID-993k-m3sq-gufu"},{"vulnerability":"VCID-am36-6m5v-fkba"},{"vulnerability":"VCID-apyh-1uza-pffa"},{"vulnerability":"VCID-aznw-8yer-xfhf"},{"vulnerability":"VCID-bzht-vhe3-y7bf"},{"vulnerability":"VCID-ev9c-v5dv-37fb"},{"vulnerability":"VCID-fkyp-m1p9-mfhy"},{"vulnerability":"VCID-k4yw-jg6v-1bcc"},{"vulnerability":"VCID-p8gy-dd3u-uqh4"},{"vulnerability":"VCID-pwkd-sgtt-1bef"},{"vulnerability":"VCID-q8a8-fd7r-1kg7"},{"vulnerability":"VCID-qxwq-vp9g-ukca"},{"vulnerability":"VCID-ucmb-we3r-aqcd"},{"vulnerability":"VCID-vx54-r2dt-8ue5"},{"vulnerability":"VCID-w17y-dvuq-7ba6"},{"vulnerability":"VCID-wqu4-wys6-hfbb"},{"vulnerability":"VCID-zjj3-g2d7-c3gd"},{"vulnerability":"VCID-zt43-htwu-kfde"},{"vulnerability":"VCID-zxp7-6d69-tfhm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"}],"aliases":["CVE-2014-5031"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yyrd-qt22-w3f5"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"}