{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","type":"deb","namespace":"debian","name":"cups","version":"0","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.1.18-1","latest_non_vulnerable_version":"2.4.18-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88520?format=json","vulnerability_id":"VCID-3cy2-awj3-hqhn","summary":"cups: memory leak handling IPP browse requests","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0596.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0596.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0596","reference_id":"","reference_type":"","scores":[{"value":"0.04313","scoring_system":"epss","scoring_elements":"0.88988","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04313","scoring_system":"epss","scoring_elements":"0.88998","published_at":"2026-05-15T12:55:00Z"},{"value":"0.04313","scoring_system":"epss","scoring_elements":"0.88996","published_at":"2026-05-16T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.88932","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.8895","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.88967","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.88961","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.8896","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.88972","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.88905","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.88992","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.88999","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.89013","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.89024","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.89018","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.89027","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.88971","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.88913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04363","scoring_system":"epss","scoring_elements":"0.88929","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0596"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=433825","reference_id":"433825","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=433825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0153","reference_id":"RHSA-2008:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0161","reference_id":"RHSA-2008:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0161"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2008-0596"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3cy2-awj3-hqhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34385?format=json","vulnerability_id":"VCID-43eg-4nf5-dubb","summary":"Multiple vulnerabilities have been found in CUPS, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4183.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4183","reference_id":"","reference_type":"","scores":[{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35085","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34853","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34755","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34822","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3484","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35285","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35314","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35196","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35266","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35269","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35234","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35249","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35235","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34951","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34933","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34843","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34715","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34787","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34825","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34729","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4183"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/HT208849","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208849"},{"reference_url":"https://www.debian.org/security/2018/dsa-4243","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4243"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607284","reference_id":"1607284","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607284"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4183","reference_id":"CVE-2018-4183","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4183"},{"reference_url":"https://security.gentoo.org/glsa/201908-08","reference_id":"GLSA-201908-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-08"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2018-4183"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-43eg-4nf5-dubb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86867?format=json","vulnerability_id":"VCID-8p6s-k3gc-z7fr","summary":"cups: 'Listen localhost:631' option not honoured correctly on IPv6-enabled systems when systemd used for CUPS socket activation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6094.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6094.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6094","reference_id":"","reference_type":"","scores":[{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71622","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71628","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71646","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71619","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71659","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71693","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71676","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71658","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71702","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71708","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.7169","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71739","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71744","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71749","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71734","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71768","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71801","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71767","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71795","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71853","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71862","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71873","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6094"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=891942","reference_id":"891942","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=891942"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2012-6094"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8p6s-k3gc-z7fr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80325?format=json","vulnerability_id":"VCID-azma-9b5q-57b3","summary":"cups: insecure permissions of /var/log/cups allows for symlink attacks","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25317.json","reference_id":"","reference_type":"","scores":[{"value":"2.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25317.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25317","reference_id":"","reference_type":"","scores":[{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27748","published_at":"2026-04-01T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27788","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27827","published_at":"2026-04-04T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27684","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27727","published_at":"2026-04-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27732","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27688","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2763","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2764","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27614","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27575","published_at":"2026-04-21T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27533","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27427","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2735","published_at":"2026-04-29T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27181","published_at":"2026-05-05T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27242","published_at":"2026-05-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27263","published_at":"2026-05-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27179","published_at":"2026-05-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27193","published_at":"2026-05-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27271","published_at":"2026-05-14T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27287","published_at":"2026-05-15T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27265","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25317"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1949119","reference_id":"1949119","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1949119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2021-25317"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-azma-9b5q-57b3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31225?format=json","vulnerability_id":"VCID-ctb2-8h4y-vybd","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0166","reference_id":"","reference_type":"","scores":[{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.8988","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89883","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89895","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89916","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89922","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89927","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.8992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89934","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89936","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89931","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89947","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89946","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89944","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89958","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89973","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89985","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.8998","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.89988","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.90003","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.90012","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0519","scoring_system":"epss","scoring_elements":"0.90013","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490625","reference_id":"490625","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490625"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/200904-20","reference_id":"GLSA-200904-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-20"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2009-0166"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31223?format=json","vulnerability_id":"VCID-dgb8-nes9-8fb7","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0147","reference_id":"","reference_type":"","scores":[{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84926","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.8494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84959","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84986","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.84993","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85008","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85003","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85024","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85023","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85048","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85054","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85071","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85095","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85116","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85112","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85127","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.8516","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85169","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02384","scoring_system":"epss","scoring_elements":"0.85173","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490614","reference_id":"490614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490614"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/200904-20","reference_id":"GLSA-200904-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-20"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2009-0147"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/130330?format=json","vulnerability_id":"VCID-enxz-181c-cfgj","summary":"Heap-based buffer overflow in the USB backend in CUPS in Apple Mac OS X 10.5.8 allows local users to gain privileges via unspecified vectors.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2807","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20201","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2035","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20409","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20216","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20274","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.203","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20254","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20194","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20187","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20191","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2019","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20068","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20063","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19941","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20018","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20103","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20073","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20097","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20186","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20188","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20198","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2807"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2009-2807"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-enxz-181c-cfgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34873?format=json","vulnerability_id":"VCID-fct6-695j-t7bs","summary":"PDFKit and ImageKits are vulnerable to an integer overflow and a stack\n    overflow allowing for the user-assisted execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3387.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3387","reference_id":"","reference_type":"","scores":[{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92529","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92534","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92541","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92544","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92559","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92565","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92566","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92577","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92576","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92581","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92578","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92588","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.926","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08892","scoring_system":"epss","scoring_elements":"0.92611","published_at":"2026-05-09T12:55:00Z"},{"value":"0.10704","scoring_system":"epss","scoring_elements":"0.93379","published_at":"2026-05-11T12:55:00Z"},{"value":"0.10704","scoring_system":"epss","scoring_elements":"0.93386","published_at":"2026-05-12T12:55:00Z"},{"value":"0.10704","scoring_system":"epss","scoring_elements":"0.934","published_at":"2026-05-14T12:55:00Z"},{"value":"0.10704","scoring_system":"epss","scoring_elements":"0.93407","published_at":"2026-05-15T12:55:00Z"},{"value":"0.10704","scoring_system":"epss","scoring_elements":"0.93401","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=248194","reference_id":"248194","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=248194"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460","reference_id":"435460","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462","reference_id":"435462","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435462"},{"reference_url":"https://security.gentoo.org/glsa/200709-12","reference_id":"GLSA-200709-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200709-12"},{"reference_url":"https://security.gentoo.org/glsa/200709-17","reference_id":"GLSA-200709-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200709-17"},{"reference_url":"https://security.gentoo.org/glsa/200710-08","reference_id":"GLSA-200710-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-08"},{"reference_url":"https://security.gentoo.org/glsa/200710-20","reference_id":"GLSA-200710-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0720","reference_id":"RHSA-2007:0720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0729","reference_id":"RHSA-2007:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0730","reference_id":"RHSA-2007:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0731","reference_id":"RHSA-2007:0731","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0731"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0732","reference_id":"RHSA-2007:0732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0735","reference_id":"RHSA-2007:0735","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0735"},{"reference_url":"https://usn.ubuntu.com/496-1/","reference_id":"USN-496-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/496-1/"},{"reference_url":"https://usn.ubuntu.com/496-2/","reference_id":"USN-496-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/496-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2007-3387"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fct6-695j-t7bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34383?format=json","vulnerability_id":"VCID-ma98-ankz-ska4","summary":"Multiple vulnerabilities have been found in CUPS, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4182.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4182.json"},{"reference_url":"https://access.redhat.com/security/cve/cve-2018-4182","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/security/cve/cve-2018-4182"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4182","reference_id":"","reference_type":"","scores":[{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35085","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34853","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34755","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34822","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3484","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35285","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35314","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35196","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35266","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35269","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35234","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35249","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35235","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34951","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34933","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34843","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34715","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34787","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34825","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34729","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4182"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/HT208849","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208849"},{"reference_url":"https://www.debian.org/security/2018/dsa-4243","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4243"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607283","reference_id":"1607283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607283"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4182","reference_id":"CVE-2018-4182","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4182"},{"reference_url":"https://security.gentoo.org/glsa/201908-08","reference_id":"GLSA-201908-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-08"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2018-4182"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ma98-ankz-ska4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88521?format=json","vulnerability_id":"VCID-mybj-wn6t-aucs","summary":"cups: dereference of free'd memory handling IPP browse requests","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0597.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0597","reference_id":"","reference_type":"","scores":[{"value":"0.05899","scoring_system":"epss","scoring_elements":"0.9069","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05899","scoring_system":"epss","scoring_elements":"0.90697","published_at":"2026-05-15T12:55:00Z"},{"value":"0.05899","scoring_system":"epss","scoring_elements":"0.90698","published_at":"2026-05-16T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.9065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90659","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90653","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90672","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.9067","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90667","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90611","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90684","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.9068","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90695","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90713","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90727","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90725","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90735","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90682","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90615","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05967","scoring_system":"epss","scoring_elements":"0.90625","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0597"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=433847","reference_id":"433847","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=433847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0153","reference_id":"RHSA-2008:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0161","reference_id":"RHSA-2008:0161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0161"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2008-0597"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mybj-wn6t-aucs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/101592?format=json","vulnerability_id":"VCID-txsp-9r9g-a3cp","summary":"Buffer overflow in lpstat in SCO OpenServer 5.0 through 5.0.6a allows local users to execute arbitrary code as group bin via a long command line argument.","references":[{"reference_url":"ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.38/CSSA-2001-SCO.38.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.38/CSSA-2001-SCO.38.txt"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2001-1508","reference_id":"","reference_type":"","scores":[{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27822","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28307","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28379","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.2842","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28212","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28279","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28321","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28327","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28225","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28237","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28173","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28087","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27974","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27896","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.2773","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27793","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27814","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27731","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27747","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27823","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27843","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2001-1508"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6413","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6413"},{"reference_url":"http://www.securityfocus.com/bid/2597","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/2597"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sco:openserver:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sco:openserver:5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.6a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sco:openserver:5.0.6a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sco:openserver:5.0.6a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2001-1508","reference_id":"CVE-2001-1508","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2001-1508"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2001-1508"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-txsp-9r9g-a3cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88501?format=json","vulnerability_id":"VCID-uka8-ug6a-dfg8","summary":"cups: incomplete fix for CVE-2004-0888 / CVE-2005-0206","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1374.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1374.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1374","reference_id":"","reference_type":"","scores":[{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84716","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.8475","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84753","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84776","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.848","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84796","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84812","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84813","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84811","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84838","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84847","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84863","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84888","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84906","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84901","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84917","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84949","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84959","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02318","scoring_system":"epss","scoring_elements":"0.84962","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1374"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=438336","reference_id":"438336","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=438336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0206","reference_id":"RHSA-2008:0206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0206"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2008-1374"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uka8-ug6a-dfg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58946?format=json","vulnerability_id":"VCID-uzg5-a999-afhp","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2305.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2305.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2305","reference_id":"","reference_type":"","scores":[{"value":"0.28664","scoring_system":"epss","scoring_elements":"0.96506","published_at":"2026-04-01T12:55:00Z"},{"value":"0.28664","scoring_system":"epss","scoring_elements":"0.96515","published_at":"2026-04-02T12:55:00Z"},{"value":"0.28664","scoring_system":"epss","scoring_elements":"0.9652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.28664","scoring_system":"epss","scoring_elements":"0.96524","published_at":"2026-04-07T12:55:00Z"},{"value":"0.28664","scoring_system":"epss","scoring_elements":"0.96532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.28664","scoring_system":"epss","scoring_elements":"0.96534","published_at":"2026-04-09T12:55:00Z"},{"value":"0.28664","scoring_system":"epss","scoring_elements":"0.96537","published_at":"2026-04-12T12:55:00Z"},{"value":"0.28664","scoring_system":"epss","scoring_elements":"0.9654","published_at":"2026-04-13T12:55:00Z"},{"value":"0.28664","scoring_system":"epss","scoring_elements":"0.96546","published_at":"2026-04-16T12:55:00Z"},{"value":"0.28664","scoring_system":"epss","scoring_elements":"0.96552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.28664","scoring_system":"epss","scoring_elements":"0.96555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.28664","scoring_system":"epss","scoring_elements":"0.96556","published_at":"2026-04-24T12:55:00Z"},{"value":"0.32919","scoring_system":"epss","scoring_elements":"0.96909","published_at":"2026-04-29T12:55:00Z"},{"value":"0.32919","scoring_system":"epss","scoring_elements":"0.96913","published_at":"2026-05-05T12:55:00Z"},{"value":"0.32919","scoring_system":"epss","scoring_elements":"0.96917","published_at":"2026-05-07T12:55:00Z"},{"value":"0.32919","scoring_system":"epss","scoring_elements":"0.96924","published_at":"2026-05-09T12:55:00Z"},{"value":"0.32919","scoring_system":"epss","scoring_elements":"0.96926","published_at":"2026-05-11T12:55:00Z"},{"value":"0.32919","scoring_system":"epss","scoring_elements":"0.96931","published_at":"2026-05-12T12:55:00Z"},{"value":"0.32919","scoring_system":"epss","scoring_elements":"0.96942","published_at":"2026-05-14T12:55:00Z"},{"value":"0.32919","scoring_system":"epss","scoring_elements":"0.96945","published_at":"2026-05-15T12:55:00Z"},{"value":"0.32919","scoring_system":"epss","scoring_elements":"0.96946","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0232","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0232"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0273"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1352","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1352"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191049","reference_id":"1191049","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191049"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778397","reference_id":"778397","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778397"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778402","reference_id":"778402","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778402"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778406","reference_id":"778406","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778406"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778408","reference_id":"778408","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778408"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778409","reference_id":"778409","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778409"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778412","reference_id":"778412","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1053","reference_id":"RHSA-2015:1053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1066","reference_id":"RHSA-2015:1066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1066"},{"reference_url":"https://usn.ubuntu.com/2572-1/","reference_id":"USN-2572-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2572-1/"},{"reference_url":"https://usn.ubuntu.com/2594-1/","reference_id":"USN-2594-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2594-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2015-2305"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uzg5-a999-afhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31221?format=json","vulnerability_id":"VCID-ynvq-nzrq-9bca","summary":"Multiple vulnerabilities have been found in Poppler, some of which\n    may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0146","reference_id":"","reference_type":"","scores":[{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8246","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82491","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82514","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8254","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82536","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82531","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82594","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82604","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8261","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82651","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82671","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.8267","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82686","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82727","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82735","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01745","scoring_system":"epss","scoring_elements":"0.82736","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=490612","reference_id":"490612","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=490612"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806","reference_id":"524806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809","reference_id":"524809","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809"},{"reference_url":"https://security.gentoo.org/glsa/200904-20","reference_id":"GLSA-200904-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-20"},{"reference_url":"https://security.gentoo.org/glsa/201310-03","reference_id":"GLSA-201310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0429","reference_id":"RHSA-2009:0429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0430","reference_id":"RHSA-2009:0430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0431","reference_id":"RHSA-2009:0431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0458","reference_id":"RHSA-2009:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0480","reference_id":"RHSA-2009:0480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0399","reference_id":"RHSA-2010:0399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0400","reference_id":"RHSA-2010:0400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0400"},{"reference_url":"https://usn.ubuntu.com/759-1/","reference_id":"USN-759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/759-1/"},{"reference_url":"https://usn.ubuntu.com/973-1/","reference_id":"USN-973-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/973-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582876?format=json","purl":"pkg:deb/debian/cups@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582113?format=json","purl":"pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582114?format=json","purl":"pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582115?format=json","purl":"pkg:deb/debian/cups@2.4.10-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-jy1y-e1nk-p3b4"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"},{"vulnerability":"VCID-wr17-e776-bqh1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.10-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582116?format=json","purl":"pkg:deb/debian/cups@2.4.16-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-63fa-a4pr-wqh3"},{"vulnerability":"VCID-b1yf-xuc1-ykak"},{"vulnerability":"VCID-dx89-e1nn-w7gz"},{"vulnerability":"VCID-gwcb-nhpk-2kca"},{"vulnerability":"VCID-hc4t-becn-rkcc"},{"vulnerability":"VCID-r1q4-2dq2-33ca"},{"vulnerability":"VCID-ry9y-z4e4-yfdh"},{"vulnerability":"VCID-vgtp-sjtt-73e9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.16-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072608?format=json","purl":"pkg:deb/debian/cups@2.4.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081509?format=json","purl":"pkg:deb/debian/cups@2.4.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.18-1%3Fdistro=trixie"}],"aliases":["CVE-2009-0146"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@0%3Fdistro=trixie"}