{"url":"http://public2.vulnerablecode.io/api/packages/77041?format=json","purl":"pkg:ebuild/app-text/ghostscript-gpl@9.10-r2","type":"ebuild","namespace":"app-text","name":"ghostscript-gpl","version":"9.10-r2","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"9.20-r1","latest_non_vulnerable_version":"10.05.1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47319?format=json","vulnerability_id":"VCID-1w61-4pht-ayaq","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"http://bugs.ghostscript.com/show_bug.cgi?id=690523","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.ghostscript.com/show_bug.cgi?id=690523"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4897.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4897.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4897","reference_id":"","reference_type":"","scores":[{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92326","published_at":"2026-05-14T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92222","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92229","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92235","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92249","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92253","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92259","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.9226","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92256","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92268","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92267","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92273","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92274","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.9227","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.9228","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.9229","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92299","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92301","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92308","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4897"},{"reference_url":"http://secunia.com/advisories/40580","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40580"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-17.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60380","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60380"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:134","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:134"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:135","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:135"},{"reference_url":"http://www.osvdb.org/66277","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/66277"},{"reference_url":"http://www.securityfocus.com/bid/41593","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/41593"},{"reference_url":"http://www.ubuntu.com/usn/USN-961-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-961-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=613792","reference_id":"613792","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=613792"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-4897","reference_id":"CVE-2009-4897","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-4897"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://usn.ubuntu.com/961-1/","reference_id":"USN-961-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/961-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77041?format=json","purl":"pkg:ebuild/app-text/ghostscript-gpl@9.10-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.10-r2"}],"aliases":["CVE-2009-4897"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1w61-4pht-ayaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47317?format=json","vulnerability_id":"VCID-d7z5-jnez-xfaq","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3743.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3743.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3743","reference_id":"","reference_type":"","scores":[{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88447","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88284","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88306","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.8831","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.8833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88336","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88346","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88338","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88351","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88348","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88363","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88368","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88369","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.8838","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88396","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88408","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88406","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88419","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3743"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-17.xml"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2012-0095.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2012-0095.html"},{"reference_url":"http://www.kb.cert.org/vuls/id/644319","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/644319"},{"reference_url":"http://www.kb.cert.org/vuls/id/JALR-87YGN8","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/JALR-87YGN8"},{"reference_url":"http://www.securityfocus.com/archive/1/514892/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/514892/100/0/threaded"},{"reference_url":"http://www.securitytracker.com/id?1024785","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1024785"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=627902","reference_id":"627902","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=627902"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-3743","reference_id":"CVE-2009-3743","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-3743"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0095","reference_id":"RHSA-2012:0095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0095"},{"reference_url":"https://usn.ubuntu.com/1317-1/","reference_id":"USN-1317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1317-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77041?format=json","purl":"pkg:ebuild/app-text/ghostscript-gpl@9.10-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.10-r2"}],"aliases":["CVE-2009-3743"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d7z5-jnez-xfaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47315?format=json","vulnerability_id":"VCID-frrd-yd7x-jkdh","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0196.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0196","reference_id":"","reference_type":"","scores":[{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93783","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93792","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93805","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93817","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93822","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93845","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.9385","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93854","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93853","published_at":"2026-04-26T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93851","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93859","published_at":"2026-05-05T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.9387","published_at":"2026-05-07T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.9388","published_at":"2026-05-09T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93883","published_at":"2026-05-11T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93888","published_at":"2026-05-12T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93902","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0196"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=493379","reference_id":"493379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=493379"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524803","reference_id":"524803","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524803"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0421","reference_id":"RHSA-2009:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0421"},{"reference_url":"https://usn.ubuntu.com/757-1/","reference_id":"USN-757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/757-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77041?format=json","purl":"pkg:ebuild/app-text/ghostscript-gpl@9.10-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.10-r2"}],"aliases":["CVE-2009-0196"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-frrd-yd7x-jkdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47322?format=json","vulnerability_id":"VCID-jzm6-e1q8-puem","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"http://ghostscript.com/pipermail/gs-cvs/2010-January/010333.html","reference_id":"","reference_type":"","scores":[],"url":"http://ghostscript.com/pipermail/gs-cvs/2010-January/010333.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-0096.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-0096.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4054.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4054.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4054","reference_id":"","reference_type":"","scores":[{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64899","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64913","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.6493","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64808","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64859","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64886","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83198","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83222","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83243","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83263","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83279","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83313","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83123","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83119","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83157","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.8316","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83183","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.8319","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4054"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4054","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4054"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-17.xml"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2012-0095.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2012-0095.html"},{"reference_url":"http://www.kb.cert.org/vuls/id/538191","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/538191"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=646086","reference_id":"646086","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=646086"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4054","reference_id":"CVE-2010-4054","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4054"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0095","reference_id":"RHSA-2012:0095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0096","reference_id":"RHSA-2012:0096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0096"},{"reference_url":"https://usn.ubuntu.com/1317-1/","reference_id":"USN-1317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1317-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77041?format=json","purl":"pkg:ebuild/app-text/ghostscript-gpl@9.10-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.10-r2"}],"aliases":["CVE-2010-4054"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jzm6-e1q8-puem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47323?format=json","vulnerability_id":"VCID-n21h-5ck9-43ck","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00015.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1256.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1256.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4405.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4405.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4405","reference_id":"","reference_type":"","scores":[{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97099","published_at":"2026-05-14T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97019","published_at":"2026-04-01T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97027","published_at":"2026-04-02T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.9703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.9704","published_at":"2026-04-08T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97041","published_at":"2026-04-09T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97045","published_at":"2026-04-13T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97055","published_at":"2026-04-16T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97059","published_at":"2026-04-18T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97064","published_at":"2026-04-21T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97065","published_at":"2026-04-24T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97068","published_at":"2026-04-26T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97069","published_at":"2026-04-29T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97072","published_at":"2026-05-05T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97075","published_at":"2026-05-07T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97081","published_at":"2026-05-09T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97085","published_at":"2026-05-11T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.9709","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405"},{"reference_url":"http://secunia.com/advisories/50719","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50719"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-17.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78411","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78411"},{"reference_url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0301","reference_id":"","reference_type":"","scores":[],"url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0301"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:151","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:151"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:089","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:089"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:090","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:090"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/09/11/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/09/11/2"},{"reference_url":"http://www.securityfocus.com/bid/55494","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55494"},{"reference_url":"http://www.securitytracker.com/id?1027517","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1027517"},{"reference_url":"http://www.ubuntu.com/usn/USN-1581-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1581-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687274","reference_id":"687274","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687274"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687275","reference_id":"687275","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687275"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=854227","reference_id":"854227","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=854227"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:cms:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:argyllcms:cms:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:cms:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:color:icclib:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:color:icclib:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:color:icclib:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:9.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:9.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:9.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4405","reference_id":"CVE-2012-4405","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4405"},{"reference_url":"https://security.gentoo.org/glsa/201402-29","reference_id":"GLSA-201402-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-29"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1256","reference_id":"RHSA-2012:1256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1256"},{"reference_url":"https://usn.ubuntu.com/1581-1/","reference_id":"USN-1581-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1581-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77041?format=json","purl":"pkg:ebuild/app-text/ghostscript-gpl@9.10-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.10-r2"}],"aliases":["CVE-2012-4405"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n21h-5ck9-43ck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47321?format=json","vulnerability_id":"VCID-px5c-mg2t-8uhg","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583183","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583183"},{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583316","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583316"},{"reference_url":"http://bugs.ghostscript.com/show_bug.cgi?id=691339","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.ghostscript.com/show_bug.cgi?id=691339"},{"reference_url":"http://bugs.ghostscript.com/show_bug.cgi?id=691350","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.ghostscript.com/show_bug.cgi?id=691350"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2055.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2055.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2055","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19998","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20032","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20178","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20237","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19962","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20042","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20119","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20074","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20016","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20001","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19996","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19886","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19881","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1985","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19753","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19832","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19917","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19884","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19909","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2055"},{"reference_url":"http://savannah.gnu.org/forum/forum.php?forum_id=6368","reference_id":"","reference_type":"","scores":[],"url":"http://savannah.gnu.org/forum/forum.php?forum_id=6368"},{"reference_url":"https://bugzilla.novell.com/show_bug.cgi?id=608071","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.novell.com/show_bug.cgi?id=608071"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2055"},{"reference_url":"http://secunia.com/advisories/40452","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40452"},{"reference_url":"http://secunia.com/advisories/40475","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40475"},{"reference_url":"http://secunia.com/advisories/40532","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40532"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-17.xml"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2012-0095.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2012-0095.html"},{"reference_url":"http://www.osvdb.org/66247","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/66247"},{"reference_url":"http://www.securityfocus.com/archive/1/511433","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/511433"},{"reference_url":"http://www.securityfocus.com/archive/1/511472","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/511472"},{"reference_url":"http://www.securityfocus.com/archive/1/511474","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/511474"},{"reference_url":"http://www.securityfocus.com/archive/1/511476","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/511476"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1757","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1757"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584653","reference_id":"584653","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584653"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=599564","reference_id":"599564","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=599564"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2055","reference_id":"CVE-2010-2055","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2055"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0095","reference_id":"RHSA-2012:0095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0095"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77041?format=json","purl":"pkg:ebuild/app-text/ghostscript-gpl@9.10-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.10-r2"}],"aliases":["CVE-2010-2055"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-px5c-mg2t-8uhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47320?format=json","vulnerability_id":"VCID-w2bj-tjet-3kbp","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"http://bugs.ghostscript.com/show_bug.cgi?id=691295","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.ghostscript.com/show_bug.cgi?id=691295"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1628.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1628","reference_id":"","reference_type":"","scores":[{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89933","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89811","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89814","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89828","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.8985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89862","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.8986","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89853","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89866","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89867","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89876","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89874","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89887","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89902","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89913","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89909","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89916","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1628"},{"reference_url":"https://bugs.launchpad.net/ubuntu/+source/ghostscript/+bug/546009","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/+source/ghostscript/+bug/546009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1628"},{"reference_url":"http://seclists.org/fulldisclosure/2010/May/134","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2010/May/134"},{"reference_url":"http://secunia.com/advisories/39753","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39753"},{"reference_url":"http://secunia.com/advisories/40580","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40580"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-17.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:134","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:134"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/05/12/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/05/12/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/05/18/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/05/18/7"},{"reference_url":"http://www.securityfocus.com/archive/1/511243/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/511243/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/40107","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/40107"},{"reference_url":"http://www.ubuntu.com/usn/USN-961-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-961-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1138","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1138"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584516","reference_id":"584516","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584516"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=592492","reference_id":"592492","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=592492"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1628","reference_id":"CVE-2010-1628","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1628"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://usn.ubuntu.com/961-1/","reference_id":"USN-961-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/961-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77041?format=json","purl":"pkg:ebuild/app-text/ghostscript-gpl@9.10-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.10-r2"}],"aliases":["CVE-2010-1628"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w2bj-tjet-3kbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47318?format=json","vulnerability_id":"VCID-w823-crw1-vub8","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4270.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4270.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4270","reference_id":"","reference_type":"","scores":[{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92404","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92411","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92419","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92423","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92439","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92445","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92448","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92457","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92456","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92459","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92461","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92463","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92458","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92469","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92479","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92489","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92493","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92499","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92519","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=540760","reference_id":"540760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=540760"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562643","reference_id":"562643","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562643"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://usn.ubuntu.com/961-1/","reference_id":"USN-961-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/961-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77041?format=json","purl":"pkg:ebuild/app-text/ghostscript-gpl@9.10-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.10-r2"}],"aliases":["CVE-2009-4270"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w823-crw1-vub8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47316?format=json","vulnerability_id":"VCID-z1mg-r3dd-73gg","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0792.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0792.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0792","reference_id":"","reference_type":"","scores":[{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78637","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78643","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78654","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.7868","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78711","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78693","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78685","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78714","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78709","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78744","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78762","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78781","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78805","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.7882","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78818","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78835","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78873","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=491853","reference_id":"491853","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=491853"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523472","reference_id":"523472","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523472"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524915","reference_id":"524915","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524915"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0420","reference_id":"RHSA-2009:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0421","reference_id":"RHSA-2009:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0421"},{"reference_url":"https://usn.ubuntu.com/757-1/","reference_id":"USN-757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/757-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77041?format=json","purl":"pkg:ebuild/app-text/ghostscript-gpl@9.10-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.10-r2"}],"aliases":["CVE-2009-0792"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z1mg-r3dd-73gg"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/ghostscript-gpl@9.10-r2"}