{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","type":"deb","namespace":"debian","name":"ghostscript","version":"9.53.3~dfsg-7+deb11u7","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"9.53.3~dfsg-7+deb11u8","latest_non_vulnerable_version":"10.07.0~dfsg-2","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78280?format=json","vulnerability_id":"VCID-1nh4-crmx-jfb5","summary":"ghostscript: Integer overflow in pcl/pl/plfont.c:418 in pl_glyph_name","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38560.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38560.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38560","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01721","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01737","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01736","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01739","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01748","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01733","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01723","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38560"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38560","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38560"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224368","reference_id":"2224368","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T18:44:07Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224368"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-38560","reference_id":"CVE-2023-38560","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T18:44:07Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-38560"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=b7eb1d0174c","reference_id":"?p=ghostpdl.git;a=commitdiff;h=b7eb1d0174c","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T18:44:07Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=b7eb1d0174c"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=706898","reference_id":"show_bug.cgi?id=706898","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-29T18:44:07Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=706898"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923089?format=json","purl":"pkg:deb/debian/ghostscript@10.02.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.02.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2023-38560"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1nh4-crmx-jfb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79521?format=json","vulnerability_id":"VCID-j6nh-rfbg-z7f7","summary":"ghostscript: Improper release of objects in chunk_free_object during PCL to PDF conversion","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1350.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1350.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1350","reference_id":"","reference_type":"","scores":[{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53729","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53796","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53756","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.5373","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53782","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53828","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53811","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1350"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1350","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1350"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075523","reference_id":"2075523","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075523"},{"reference_url":"https://bugs.ghostscript.com/attachment.cgi?id=22323","reference_id":"attachment.cgi?id=22323","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:15:08Z/"}],"url":"https://bugs.ghostscript.com/attachment.cgi?id=22323"},{"reference_url":"https://vuldb.com/?id.197290","reference_id":"?id.197290","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:15:08Z/"}],"url":"https://vuldb.com/?id.197290"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=705156","reference_id":"show_bug.cgi?id=705156","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:15:08Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=705156"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923080?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2022-1350"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j6nh-rfbg-z7f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67455?format=json","vulnerability_id":"VCID-k837-n44h-pkbm","summary":"Artifex Ghostscript: Artifex Ghostscript: Denial of Service via crafted document processing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59800.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59800.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59800","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04372","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04419","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04406","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04441","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04459","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04451","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04396","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59800"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397226","reference_id":"2397226","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397226"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=176cf0188a2294bc307b8caec876f39412e58350","reference_id":"?id=176cf0188a2294bc307b8caec876f39412e58350","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:52:31Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=176cf0188a2294bc307b8caec876f39412e58350"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708602","reference_id":"show_bug.cgi?id=708602","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:52:31Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708602"},{"reference_url":"https://usn.ubuntu.com/7782-1/","reference_id":"USN-7782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7782-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923105?format=json","purl":"pkg:deb/debian/ghostscript@10.06.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.06.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-59800"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k837-n44h-pkbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69514?format=json","vulnerability_id":"VCID-rdmp-hfbg-2kh5","summary":"Ghostscript: Ghostscript Argument Sanitization Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48708.json","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48708.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-48708","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06732","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06678","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06739","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06633","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-48708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48708"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368134","reference_id":"2368134","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368134"},{"reference_url":"https://security.archlinux.org/ASA-202505-15","reference_id":"ASA-202505-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-15"},{"reference_url":"https://security.archlinux.org/AVG-2883","reference_id":"AVG-2883","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2883"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b587663c623b4462f9e78686a31fd880207303ee","reference_id":"?id=b587663c623b4462f9e78686a31fd880207303ee","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-23T13:21:22Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b587663c623b4462f9e78686a31fd880207303ee"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708446","reference_id":"show_bug.cgi?id=708446","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-23T13:21:22Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708446"},{"reference_url":"https://usn.ubuntu.com/7623-1/","reference_id":"USN-7623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7623-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923103?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-48708"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rdmp-hfbg-2kh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75006?format=json","vulnerability_id":"VCID-t3n4-wrgr-bkdy","summary":"ghostscript: ghostscript: arbitrary file read/write through Tesseract configuration","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29511.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29511","reference_id":"","reference_type":"","scores":[{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73692","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73653","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73677","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.7365","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73719","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00781","scoring_system":"epss","scoring_elements":"0.73701","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29511"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295648","reference_id":"2295648","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295648"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/07/03/7","reference_id":"7","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-05T15:17:09Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/07/03/7"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=3d4cfdc1a44","reference_id":"?p=ghostpdl.git%3Ba=commitdiff%3Bh=3d4cfdc1a44","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-05T15:17:09Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=3d4cfdc1a44"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510","reference_id":"show_bug.cgi?id=707510","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-05T15:17:09Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510"},{"reference_url":"https://usn.ubuntu.com/6897-1/","reference_id":"USN-6897-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6897-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923094?format=json","purl":"pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-29511"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t3n4-wrgr-bkdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96825?format=json","vulnerability_id":"VCID-wzad-uxqp-63h3","summary":"In Artifex GhostXPS before 10.06.0, there is a stack-based buffer overflow in xps_unpredict_tiff in xpstiff.c because the samplesperpixel value is not checked.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59801","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03929","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04005","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03975","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03958","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03953","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0398","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03987","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59801"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=99727069197d548a8db69ba5d63f766bff40eaab","reference_id":"?id=99727069197d548a8db69ba5d63f766bff40eaab","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:53:38Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=99727069197d548a8db69ba5d63f766bff40eaab"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708819","reference_id":"show_bug.cgi?id=708819","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:53:38Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708819"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923105?format=json","purl":"pkg:deb/debian/ghostscript@10.06.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.06.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-59801"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wzad-uxqp-63h3"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34479?format=json","vulnerability_id":"VCID-13xq-dznu-bueh","summary":"An integer overflow in GPL Ghostscript may allow remote attackers\n    to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3228.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3228.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3228","reference_id":"","reference_type":"","scores":[{"value":"0.00967","scoring_system":"epss","scoring_elements":"0.76523","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00967","scoring_system":"epss","scoring_elements":"0.76528","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00967","scoring_system":"epss","scoring_elements":"0.76556","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00967","scoring_system":"epss","scoring_elements":"0.76538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00967","scoring_system":"epss","scoring_elements":"0.7657","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00967","scoring_system":"epss","scoring_elements":"0.76581","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00967","scoring_system":"epss","scoring_elements":"0.76607","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00967","scoring_system":"epss","scoring_elements":"0.76586","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00967","scoring_system":"epss","scoring_elements":"0.76579","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3228"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3228","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3228"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1232805","reference_id":"1232805","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1232805"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793489","reference_id":"793489","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793489"},{"reference_url":"https://security.gentoo.org/glsa/201612-33","reference_id":"GLSA-201612-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-33"},{"reference_url":"https://usn.ubuntu.com/2697-1/","reference_id":"USN-2697-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2697-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923057?format=json","purl":"pkg:deb/debian/ghostscript@9.15~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.15~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2015-3228"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-13xq-dznu-bueh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61673?format=json","vulnerability_id":"VCID-16fp-tdk6-sfcc","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33869.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33869.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33869","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02705","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02708","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02699","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02685","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02684","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02698","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/06/28/2","reference_id":"2","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T20:27:59Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/06/28/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293958","reference_id":"2293958","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293958"},{"reference_url":"https://security.gentoo.org/glsa/202409-03","reference_id":"GLSA-202409-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6197","reference_id":"RHSA-2024:6197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6466","reference_id":"RHSA-2024:6466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6466"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707691","reference_id":"show_bug.cgi?id=707691","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T20:27:59Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707691"},{"reference_url":"https://usn.ubuntu.com/6835-1/","reference_id":"USN-6835-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6835-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923092?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923096?format=json","purl":"pkg:deb/debian/ghostscript@10.03.1~dfsg~git20240518-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.1~dfsg~git20240518-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-33869"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-16fp-tdk6-sfcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51897?format=json","vulnerability_id":"VCID-1mjs-khds-v3hb","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9611.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9611.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9611","reference_id":"","reference_type":"","scores":[{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60107","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60232","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60263","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.6025","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60184","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60209","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60178","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60243","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475825","reference_id":"1475825","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475825"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869917","reference_id":"869917","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869917"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9611"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1mjs-khds-v3hb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47319?format=json","vulnerability_id":"VCID-1w61-4pht-ayaq","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"http://bugs.ghostscript.com/show_bug.cgi?id=690523","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.ghostscript.com/show_bug.cgi?id=690523"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4897.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4897.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4897","reference_id":"","reference_type":"","scores":[{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92256","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92222","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92229","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92235","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92249","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92253","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.92259","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08294","scoring_system":"epss","scoring_elements":"0.9226","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4897"},{"reference_url":"http://secunia.com/advisories/40580","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40580"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-17.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60380","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60380"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:134","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:134"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:135","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:135"},{"reference_url":"http://www.osvdb.org/66277","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/66277"},{"reference_url":"http://www.securityfocus.com/bid/41593","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/41593"},{"reference_url":"http://www.ubuntu.com/usn/USN-961-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-961-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=613792","reference_id":"613792","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=613792"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-4897","reference_id":"CVE-2009-4897","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-4897"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://usn.ubuntu.com/961-1/","reference_id":"USN-961-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/961-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923050?format=json","purl":"pkg:deb/debian/ghostscript@8.70~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.70~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2009-4897"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1w61-4pht-ayaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48785?format=json","vulnerability_id":"VCID-1xn6-drde-gkd4","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14812.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14812.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14812","reference_id":"","reference_type":"","scores":[{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67658","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67734","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67693","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67744","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67758","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743754","reference_id":"1743754","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743754"},{"reference_url":"https://security.archlinux.org/ASA-201911-5","reference_id":"ASA-201911-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-5"},{"reference_url":"https://security.archlinux.org/AVG-1031","reference_id":"AVG-1031","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1031"},{"reference_url":"https://security.gentoo.org/glsa/202004-03","reference_id":"GLSA-202004-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2534","reference_id":"RHSA-2019:2534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2586","reference_id":"RHSA-2019:2586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2591","reference_id":"RHSA-2019:2591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2591"},{"reference_url":"https://usn.ubuntu.com/4111-1/","reference_id":"USN-4111-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4111-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923068?format=json","purl":"pkg:deb/debian/ghostscript@9.28~~rc2~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.28~~rc2~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-14812"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xn6-drde-gkd4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48600?format=json","vulnerability_id":"VCID-273p-y942-ekes","summary":"Multiple memory management errors in JasPer could result in\n    execution of arbitrary code or a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4517.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4517.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4517","reference_id":"","reference_type":"","scores":[{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.9744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97422","published_at":"2026-04-02T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97426","published_at":"2026-04-04T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97427","published_at":"2026-04-07T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.4213","scoring_system":"epss","scoring_elements":"0.97415","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html","reference_id":"071458.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071458.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html","reference_id":"071561.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071561.html"},{"reference_url":"http://secunia.com/advisories/47193","reference_id":"47193","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://secunia.com/advisories/47193"},{"reference_url":"http://secunia.com/advisories/47306","reference_id":"47306","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://secunia.com/advisories/47306"},{"reference_url":"http://secunia.com/advisories/47353","reference_id":"47353","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://secunia.com/advisories/47353"},{"reference_url":"http://www.securityfocus.com/bid/50992","reference_id":"50992","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.securityfocus.com/bid/50992"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/71701","reference_id":"71701","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/71701"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=747726","reference_id":"747726","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=747726"},{"reference_url":"http://osvdb.org/77596","reference_id":"77596","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://osvdb.org/77596"},{"reference_url":"http://www.kb.cert.org/vuls/id/887409","reference_id":"887409","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.kb.cert.org/vuls/id/887409"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html","reference_id":"cpujan2012-366304.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"},{"reference_url":"http://www.debian.org/security/2011/dsa-2371","reference_id":"dsa-2371","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.debian.org/security/2011/dsa-2371"},{"reference_url":"https://security.gentoo.org/glsa/201201-10","reference_id":"GLSA-201201-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-10"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1807","reference_id":"RHSA-2011:1807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1807"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-1807.html","reference_id":"RHSA-2011-1807.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2011-1807.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1811","reference_id":"RHSA-2011:1811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1811"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-1811.html","reference_id":"RHSA-2011-1811.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2011-1811.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0698","reference_id":"RHSA-2015:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0698"},{"reference_url":"https://usn.ubuntu.com/1315-1/","reference_id":"USN-1315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1315-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-1315-1","reference_id":"USN-1315-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T16:11:47Z/"}],"url":"http://www.ubuntu.com/usn/USN-1315-1"},{"reference_url":"https://usn.ubuntu.com/1317-1/","reference_id":"USN-1317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1317-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923044?format=json","purl":"pkg:deb/debian/ghostscript@8.64~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2011-4517"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-273p-y942-ekes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48599?format=json","vulnerability_id":"VCID-2hkv-yn4v-6kcy","summary":"Multiple memory management errors in JasPer could result in\n    execution of arbitrary code or a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4516.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4516.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4516","reference_id":"","reference_type":"","scores":[{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97712","published_at":"2026-04-13T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.9769","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97696","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-04-04T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97697","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97702","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97705","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.97708","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47823","scoring_system":"epss","scoring_elements":"0.9771","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=747726","reference_id":"747726","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=747726"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"https://security.gentoo.org/glsa/201201-10","reference_id":"GLSA-201201-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1807","reference_id":"RHSA-2011:1807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1811","reference_id":"RHSA-2011:1811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0698","reference_id":"RHSA-2015:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0698"},{"reference_url":"https://usn.ubuntu.com/1315-1/","reference_id":"USN-1315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1315-1/"},{"reference_url":"https://usn.ubuntu.com/1317-1/","reference_id":"USN-1317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1317-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923044?format=json","purl":"pkg:deb/debian/ghostscript@8.64~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2011-4516"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2hkv-yn4v-6kcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51929?format=json","vulnerability_id":"VCID-2kb1-haea-eqdd","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16585.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16585.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16585","reference_id":"","reference_type":"","scores":[{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.6576","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65791","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65756","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65819","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65826","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65796","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65711","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1626193","reference_id":"1626193","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1626193"},{"reference_url":"https://seclists.org/oss-sec/2018/q3/182","reference_id":"182","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/"}],"url":"https://seclists.org/oss-sec/2018/q3/182"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908305","reference_id":"908305","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908305"},{"reference_url":"https://www.debian.org/security/2018/dsa-4288","reference_id":"dsa-4288","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/"}],"url":"https://www.debian.org/security/2018/dsa-4288"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/"}],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=1497d65039885a52b598b137dd8622bd4672f9be","reference_id":"?p=ghostpdl.git%3Ba=commitdiff%3Bh=1497d65039885a52b598b137dd8622bd4672f9be","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/"}],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=1497d65039885a52b598b137dd8622bd4672f9be"},{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=971472c83a345a16dac9f90f91258bb22dd77f22","reference_id":"?p=ghostpdl.git%3Ba=commitdiff%3Bh=971472c83a345a16dac9f90f91258bb22dd77f22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/"}],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=971472c83a345a16dac9f90f91258bb22dd77f22"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-24T15:51:02Z/"}],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923061?format=json","purl":"pkg:deb/debian/ghostscript@9.25~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.25~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-16585"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2kb1-haea-eqdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43791?format=json","vulnerability_id":"VCID-2ncr-54s7-hqfz","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could result in remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36664.json","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-36664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-36664","reference_id":"","reference_type":"","scores":[{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.91014","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.91059","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.91022","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.91032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.91045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.91051","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06431","scoring_system":"epss","scoring_elements":"0.9106","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-36664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36664"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2217798","reference_id":"2217798","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2217798"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ICXN5VPF3WJCYKMPSYER5KHTPJXSTJZ/","reference_id":"2ICXN5VPF3WJCYKMPSYER5KHTPJXSTJZ","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ICXN5VPF3WJCYKMPSYER5KHTPJXSTJZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EWMEK2UPCUU3ZLL7VASE5CEHDQY4VKV/","reference_id":"5EWMEK2UPCUU3ZLL7VASE5CEHDQY4VKV","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EWMEK2UPCUU3ZLL7VASE5CEHDQY4VKV/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5446","reference_id":"dsa-5446","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://www.debian.org/security/2023/dsa-5446"},{"reference_url":"https://security.gentoo.org/glsa/202309-03","reference_id":"GLSA-202309-03","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://security.gentoo.org/glsa/202309-03"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0974e4f2ac0005d3731e0b5c13ebc7e965540f4d","reference_id":"?p=ghostpdl.git%3Ba=commit%3Bh=0974e4f2ac0005d3731e0b5c13ebc7e965540f4d","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0974e4f2ac0005d3731e0b5c13ebc7e965540f4d"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=505eab7782b429017eb434b2b95120855f2b0e3c","reference_id":"?p=ghostpdl.git%3Ba=commit%3Bh=505eab7782b429017eb434b2b95120855f2b0e3c","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=505eab7782b429017eb434b2b95120855f2b0e3c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4324","reference_id":"RHSA-2023:4324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5459","reference_id":"RHSA-2023:5459","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5459"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=706761","reference_id":"show_bug.cgi?id=706761","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-05T14:54:02Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=706761"},{"reference_url":"https://usn.ubuntu.com/6213-1/","reference_id":"USN-6213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6213-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923085?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923084?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923086?format=json","purl":"pkg:deb/debian/ghostscript@10.01.2~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.01.2~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2023-36664"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ncr-54s7-hqfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41793?format=json","vulnerability_id":"VCID-2v94-raqw-5ycp","summary":"A stack-based buffer overflow has been discovered in Ghostscript, allowing\n    arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0411.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0411.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0411","reference_id":"","reference_type":"","scores":[{"value":"0.15307","scoring_system":"epss","scoring_elements":"0.94591","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15307","scoring_system":"epss","scoring_elements":"0.94598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15307","scoring_system":"epss","scoring_elements":"0.94605","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15307","scoring_system":"epss","scoring_elements":"0.94607","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15307","scoring_system":"epss","scoring_elements":"0.94617","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15307","scoring_system":"epss","scoring_elements":"0.94621","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15307","scoring_system":"epss","scoring_elements":"0.94625","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15307","scoring_system":"epss","scoring_elements":"0.94628","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0411"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=431536","reference_id":"431536","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=431536"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=468190","reference_id":"468190","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=468190"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31309.c","reference_id":"CVE-2008-0411;OSVDB-42310","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31309.c"},{"reference_url":"https://www.securityfocus.com/bid/28017/info","reference_id":"CVE-2008-0411;OSVDB-42310","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/28017/info"},{"reference_url":"https://security.gentoo.org/glsa/200803-14","reference_id":"GLSA-200803-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200803-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0155","reference_id":"RHSA-2008:0155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0155"},{"reference_url":"https://usn.ubuntu.com/599-1/","reference_id":"USN-599-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/599-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923043?format=json","purl":"pkg:deb/debian/ghostscript@8.61.dfsg.1-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.61.dfsg.1-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2008-0411"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2v94-raqw-5ycp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73592?format=json","vulnerability_id":"VCID-2xmb-g87r-kuah","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17961.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17961.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-17961","reference_id":"","reference_type":"","scores":[{"value":"0.11327","scoring_system":"epss","scoring_elements":"0.93506","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11327","scoring_system":"epss","scoring_elements":"0.93539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11327","scoring_system":"epss","scoring_elements":"0.93531","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11327","scoring_system":"epss","scoring_elements":"0.93534","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11327","scoring_system":"epss","scoring_elements":"0.93515","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11327","scoring_system":"epss","scoring_elements":"0.93523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11327","scoring_system":"epss","scoring_elements":"0.93522","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-17961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1642578","reference_id":"1642578","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1642578"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910678","reference_id":"910678","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910678"},{"reference_url":"https://security.archlinux.org/ASA-201811-3","reference_id":"ASA-201811-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-3"},{"reference_url":"https://security.archlinux.org/AVG-786","reference_id":"AVG-786","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-786"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1682&desc=2","reference_id":"CVE-2018-17961","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1682&desc=2"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45573.txt","reference_id":"CVE-2018-17961","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45573.txt"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3834","reference_id":"RHSA-2018:3834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3834"},{"reference_url":"https://usn.ubuntu.com/3803-1/","reference_id":"USN-3803-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3803-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923065?format=json","purl":"pkg:deb/debian/ghostscript@9.25~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.25~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-17961"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2xmb-g87r-kuah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48788?format=json","vulnerability_id":"VCID-2ypb-qhkv-1yfe","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html"},{"reference_url":"http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0652","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0652"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3835.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3835.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3835","reference_id":"","reference_type":"","scores":[{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81892","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.8196","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81922","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81956","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81976","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81965","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81903","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81926","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3835"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=700585","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=700585"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3835","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00021.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A43SRQAEHQCKSEMIBINHUNIGHTDCZD7F/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A43SRQAEHQCKSEMIBINHUNIGHTDCZD7F/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANBSCZABXQUEQWIKNWJ35IYX24M227EI/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANBSCZABXQUEQWIKNWJ35IYX24M227EI/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVERLGEU3OV6RNZ2SIBXREWD3BF5H23N/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVERLGEU3OV6RNZ2SIBXREWD3BF5H23N/"},{"reference_url":"https://seclists.org/bugtraq/2019/Apr/28","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Apr/28"},{"reference_url":"https://seclists.org/bugtraq/2019/Apr/4","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Apr/4"},{"reference_url":"https://www.debian.org/security/2019/dsa-4432","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4432"},{"reference_url":"http://www.securityfocus.com/bid/107855","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107855"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1677588","reference_id":"1677588","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1677588"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925256","reference_id":"925256","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925256"},{"reference_url":"https://security.archlinux.org/ASA-201904-5","reference_id":"ASA-201904-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201904-5"},{"reference_url":"https://security.archlinux.org/AVG-929","reference_id":"AVG-929","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-929"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3835","reference_id":"CVE-2019-3835","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3835"},{"reference_url":"https://security.gentoo.org/glsa/202004-03","reference_id":"GLSA-202004-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0633","reference_id":"RHSA-2019:0633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0633"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0971","reference_id":"RHSA-2019:0971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0971"},{"reference_url":"https://usn.ubuntu.com/3915-1/","reference_id":"USN-3915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3915-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923070?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-3835"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ypb-qhkv-1yfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51923?format=json","vulnerability_id":"VCID-3f72-qcbj-3fev","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16540.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16540.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16540","reference_id":"","reference_type":"","scores":[{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51739","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51788","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51814","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51775","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.5183","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51827","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51878","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51858","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00284","scoring_system":"epss","scoring_elements":"0.51843","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625843","reference_id":"1625843","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625843"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332","reference_id":"907332","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0229","reference_id":"RHSA-2019:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0229"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923064?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-16540"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3f72-qcbj-3fev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61671?format=json","vulnerability_id":"VCID-3gax-xvqu-ykhh","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52722.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52722.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52722","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1805","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17877","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17894","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17955","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17971","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17926","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18104","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-52722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/06/28/2","reference_id":"2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T19:14:51Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/06/28/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278775","reference_id":"2278775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278775"},{"reference_url":"https://security.gentoo.org/glsa/202409-03","reference_id":"GLSA-202409-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-03"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1","reference_id":"?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T19:14:51Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1"},{"reference_url":"https://usn.ubuntu.com/6835-1/","reference_id":"USN-6835-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6835-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923092?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923089?format=json","purl":"pkg:deb/debian/ghostscript@10.02.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.02.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2023-52722"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3gax-xvqu-ykhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58220?format=json","vulnerability_id":"VCID-3kq9-v371-j3ew","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27834.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27834.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27834","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06164","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06177","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06172","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06147","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354948","reference_id":"2354948","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354948"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708253","reference_id":"show_bug.cgi?id=708253","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:36:54Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708253"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923100?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923102?format=json","purl":"pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-27834"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3kq9-v371-j3ew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48783?format=json","vulnerability_id":"VCID-3sxw-86yd-gqe1","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10216.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10216.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10216","reference_id":"","reference_type":"","scores":[{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66942","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.6698","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67005","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.66978","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67028","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67041","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.6706","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67046","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00526","scoring_system":"epss","scoring_elements":"0.67015","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10216"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1737080","reference_id":"1737080","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1737080"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934638","reference_id":"934638","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934638"},{"reference_url":"https://security.gentoo.org/glsa/202004-03","reference_id":"GLSA-202004-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2462","reference_id":"RHSA-2019:2462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2465","reference_id":"RHSA-2019:2465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2534","reference_id":"RHSA-2019:2534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2534"},{"reference_url":"https://usn.ubuntu.com/4092-1/","reference_id":"USN-4092-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4092-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923067?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-10216"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3sxw-86yd-gqe1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88759?format=json","vulnerability_id":"VCID-42g4-nh4z-m7ev","summary":"ghostscript: DoS (crash) in CCITTFax decoding filter","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6725.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6725.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6725","reference_id":"","reference_type":"","scores":[{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90786","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90792","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90814","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90825","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90832","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90841","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.9084","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06173","scoring_system":"epss","scoring_elements":"0.90838","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6725"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=493442","reference_id":"493442","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=493442"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524803","reference_id":"524803","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524803"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0420","reference_id":"RHSA-2009:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0421","reference_id":"RHSA-2009:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0421"},{"reference_url":"https://usn.ubuntu.com/757-1/","reference_id":"USN-757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/757-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923042?format=json","purl":"pkg:deb/debian/ghostscript@8.63.dfsg.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.63.dfsg.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2007-6725"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-42g4-nh4z-m7ev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48784?format=json","vulnerability_id":"VCID-479g-vu9e-1ygz","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html"},{"reference_url":"https://access.redhat.com/errata/RHBA-2019:2824","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:2824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2594","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2594"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14811.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14811","reference_id":"","reference_type":"","scores":[{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82354","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82427","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82382","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.8241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82417","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82436","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82432","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82386","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14811"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14811","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/15","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/15"},{"reference_url":"https://www.debian.org/security/2019/dsa-4518","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4518"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743757","reference_id":"1743757","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743757"},{"reference_url":"https://security.archlinux.org/ASA-201911-5","reference_id":"ASA-201911-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-5"},{"reference_url":"https://security.archlinux.org/AVG-1031","reference_id":"AVG-1031","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1031"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14811","reference_id":"CVE-2019-14811","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14811"},{"reference_url":"https://security.gentoo.org/glsa/202004-03","reference_id":"GLSA-202004-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2534","reference_id":"RHSA-2019:2534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2586","reference_id":"RHSA-2019:2586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2591","reference_id":"RHSA-2019:2591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2591"},{"reference_url":"https://usn.ubuntu.com/4111-1/","reference_id":"USN-4111-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4111-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923068?format=json","purl":"pkg:deb/debian/ghostscript@9.28~~rc2~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.28~~rc2~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-14811"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-479g-vu9e-1ygz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34546?format=json","vulnerability_id":"VCID-48nz-hudd-4kac","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7977.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7977.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7977","reference_id":"","reference_type":"","scores":[{"value":"0.01377","scoring_system":"epss","scoring_elements":"0.80199","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01377","scoring_system":"epss","scoring_elements":"0.80207","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01377","scoring_system":"epss","scoring_elements":"0.80226","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01377","scoring_system":"epss","scoring_elements":"0.80216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01377","scoring_system":"epss","scoring_elements":"0.80244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01377","scoring_system":"epss","scoring_elements":"0.80254","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01377","scoring_system":"epss","scoring_elements":"0.80272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01377","scoring_system":"epss","scoring_elements":"0.80257","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01377","scoring_system":"epss","scoring_elements":"0.80252","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1380415","reference_id":"1380415","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1380415"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839841","reference_id":"839841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839841"},{"reference_url":"https://security.gentoo.org/glsa/201702-31","reference_id":"GLSA-201702-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0013","reference_id":"RHSA-2017:0013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0014","reference_id":"RHSA-2017:0014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0014"},{"reference_url":"https://usn.ubuntu.com/3148-1/","reference_id":"USN-3148-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3148-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923056?format=json","purl":"pkg:deb/debian/ghostscript@9.19~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.19~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2016-7977"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-48nz-hudd-4kac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78135?format=json","vulnerability_id":"VCID-4ahm-1cab-auba","summary":"ghostscript: Incomplete fix for CVE-2020-16305","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4042.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4042.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4042","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10562","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10517","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10523","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10589","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10585","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10449","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4042"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228151","reference_id":"2228151","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:58:03Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228151"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-4042","reference_id":"CVE-2023-4042","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:58:03Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-4042"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7053","reference_id":"RHSA-2023:7053","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:58:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7053"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2023-4042"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ahm-1cab-auba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51909?format=json","vulnerability_id":"VCID-4c92-nxd1-m7ak","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9835.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9835.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9835","reference_id":"","reference_type":"","scores":[{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.51944","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52054","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52088","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52071","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.51992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52019","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.51985","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52039","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52036","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475837","reference_id":"1475837","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475837"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869907","reference_id":"869907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869907"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9835"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4c92-nxd1-m7ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60674?format=json","vulnerability_id":"VCID-4eac-yk5k-mueh","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16307.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16307.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16307","reference_id":"","reference_type":"","scores":[{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82582","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82597","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82634","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82642","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82649","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870162","reference_id":"1870162","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870162"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16307"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4eac-yk5k-mueh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60665?format=json","vulnerability_id":"VCID-4grr-m9cp-x3fm","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16298.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16298.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16298","reference_id":"","reference_type":"","scores":[{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.8059","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870152","reference_id":"1870152","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870152"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16298"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4grr-m9cp-x3fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78148?format=json","vulnerability_id":"VCID-4h4k-fmtp-j7bg","summary":"ghostscript: Divide by zero in eps_print_page in gdevepsn.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21710.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21710.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-21710","reference_id":"","reference_type":"","scores":[{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59058","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.5913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59165","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59169","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59182","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59202","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59118","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-21710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21710"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235001","reference_id":"2235001","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235001"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T20:07:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=4e713293de84b689c4ab358f3e110ea54aa81925","reference_id":"?p=ghostpdl.git%3Ba=commit%3Bh=4e713293de84b689c4ab358f3e110ea54aa81925","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T20:07:44Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=4e713293de84b689c4ab358f3e110ea54aa81925"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2966","reference_id":"RHSA-2024:2966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2966"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=701843","reference_id":"show_bug.cgi?id=701843","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T20:07:44Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=701843"},{"reference_url":"https://usn.ubuntu.com/6364-1/","reference_id":"USN-6364-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6364-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-21710"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4h4k-fmtp-j7bg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84669?format=json","vulnerability_id":"VCID-4hbu-thvz-6yc3","summary":"ghostscript: Use-after-free in the pdf14_open function","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=90fd0c7ca3efc1ddff64a86f4104b13b3ac969eb","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=90fd0c7ca3efc1ddff64a86f4104b13b3ac969eb"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10217.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10217.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10217","reference_id":"","reference_type":"","scores":[{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72685","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72738","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72741","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72765","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72748","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72711","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72688","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00734","scoring_system":"epss","scoring_elements":"0.72727","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10217"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=697456","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=697456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10217","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10217"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441564","reference_id":"1441564","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441564"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859662","reference_id":"859662","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859662"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10217","reference_id":"CVE-2016-10217","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10217"},{"reference_url":"https://usn.ubuntu.com/3272-1/","reference_id":"USN-3272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3272-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923058?format=json","purl":"pkg:deb/debian/ghostscript@9.20~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.20~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2016-10217"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4hbu-thvz-6yc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34547?format=json","vulnerability_id":"VCID-4sqc-r1eq-tbg2","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7978.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7978.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7978","reference_id":"","reference_type":"","scores":[{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86415","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86445","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86446","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86464","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.8649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1382300","reference_id":"1382300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1382300"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839845","reference_id":"839845","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839845"},{"reference_url":"https://security.gentoo.org/glsa/201702-31","reference_id":"GLSA-201702-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0013","reference_id":"RHSA-2017:0013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0013"},{"reference_url":"https://usn.ubuntu.com/3148-1/","reference_id":"USN-3148-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3148-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923056?format=json","purl":"pkg:deb/debian/ghostscript@9.19~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.19~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2016-7978"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4sqc-r1eq-tbg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77769?format=json","vulnerability_id":"VCID-4zba-5tgb-nufd","summary":"Ghostscript: out-of-bounds write and use-after-free in devices/vector/gdevtxtw.c (for txtwrite)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36773.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36773.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-36773","reference_id":"","reference_type":"","scores":[{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28704","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28786","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28745","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28749","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28705","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-36773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36773"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262734","reference_id":"2262734","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262734"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/tag/gs9530","reference_id":"gs9530","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-05T15:56:53Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/tag/gs9530"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=8c7bd787defa071c96289b7da9397f673fddb874","reference_id":"?p=ghostpdl.git%3Ba=commit%3Bh=8c7bd787defa071c96289b7da9397f673fddb874","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-05T15:56:53Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=8c7bd787defa071c96289b7da9397f673fddb874"},{"reference_url":"https://bugzilla.opensuse.org/show_bug.cgi?id=1177922","reference_id":"show_bug.cgi?id=1177922","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-05T15:56:53Z/"}],"url":"https://bugzilla.opensuse.org/show_bug.cgi?id=1177922"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=702229","reference_id":"show_bug.cgi?id=702229","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-05T15:56:53Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=702229"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923074?format=json","purl":"pkg:deb/debian/ghostscript@9.53.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-36773"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4zba-5tgb-nufd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3717?format=json","vulnerability_id":"VCID-4zzy-q5zp-jkgm","summary":"A buffer over-read flaw was found in the bundled expat library. An attacker who is able to get Apache to parse an untrused XML document (for example through mod_dav) may be able to cause a crash. This crash would only be a denial of service if using the worker MPM.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3720.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3720","reference_id":"","reference_type":"","scores":[{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81381","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.8131","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81319","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81341","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81339","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81368","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81373","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01541","scoring_system":"epss","scoring_elements":"0.81394","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=531697","reference_id":"531697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=531697"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551936","reference_id":"551936","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551936"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560919","reference_id":"560919","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560919"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560920","reference_id":"560920","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560920"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560921","reference_id":"560921","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560921"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560922","reference_id":"560922","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560922"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560926","reference_id":"560926","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560926"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560927","reference_id":"560927","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560927"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560928","reference_id":"560928","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560928"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560929","reference_id":"560929","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560929"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560930","reference_id":"560930","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560930"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560935","reference_id":"560935","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560935"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560936","reference_id":"560936","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560936"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560937","reference_id":"560937","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560937"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940","reference_id":"560940","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560942","reference_id":"560942","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560942"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560950","reference_id":"560950","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560950"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601053","reference_id":"601053","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601053"},{"reference_url":"https://httpd.apache.org/security/json/CVE-2009-3720.json","reference_id":"CVE-2009-3720","reference_type":"","scores":[{"value":"low","scoring_system":"apache_httpd","scoring_elements":""}],"url":"https://httpd.apache.org/security/json/CVE-2009-3720.json"},{"reference_url":"https://security.gentoo.org/glsa/201209-06","reference_id":"GLSA-201209-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1572","reference_id":"RHSA-2009:1572","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1572"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1625","reference_id":"RHSA-2009:1625","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1625"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0002","reference_id":"RHSA-2010:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0491","reference_id":"RHSA-2011:0491","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0492","reference_id":"RHSA-2011:0492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3239","reference_id":"RHSA-2017:3239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3239"},{"reference_url":"https://usn.ubuntu.com/890-1/","reference_id":"USN-890-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-1/"},{"reference_url":"https://usn.ubuntu.com/890-2/","reference_id":"USN-890-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-2/"},{"reference_url":"https://usn.ubuntu.com/890-3/","reference_id":"USN-890-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-3/"},{"reference_url":"https://usn.ubuntu.com/890-4/","reference_id":"USN-890-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-4/"},{"reference_url":"https://usn.ubuntu.com/890-5/","reference_id":"USN-890-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-5/"},{"reference_url":"https://usn.ubuntu.com/890-6/","reference_id":"USN-890-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923047?format=json","purl":"pkg:deb/debian/ghostscript@8.71~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.71~dfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2009-3720"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4zzy-q5zp-jkgm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75001?format=json","vulnerability_id":"VCID-5b3p-nax3-tuc5","summary":"ghostscript: stack-based buffer overflow in the pdfi_apply_filter()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29506.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29506.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29506","reference_id":"","reference_type":"","scores":[{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35946","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36067","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.3593","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.3598","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36003","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35971","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29506"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295626","reference_id":"2295626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295626"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/07/03/7","reference_id":"7","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T14:18:42Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/07/03/7"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Bh=77dc7f699beba606937b7ea23b50cf5974fa64b1","reference_id":"?p=ghostpdl.git%3Bh=77dc7f699beba606937b7ea23b50cf5974fa64b1","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T14:18:42Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Bh=77dc7f699beba606937b7ea23b50cf5974fa64b1"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510","reference_id":"show_bug.cgi?id=707510","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T14:18:42Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510"},{"reference_url":"https://usn.ubuntu.com/6897-1/","reference_id":"USN-6897-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6897-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923093?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923094?format=json","purl":"pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-29506"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5b3p-nax3-tuc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34545?format=json","vulnerability_id":"VCID-6ahc-7gjf-xkc4","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7976.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7976.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7976","reference_id":"","reference_type":"","scores":[{"value":"0.46832","scoring_system":"epss","scoring_elements":"0.97647","published_at":"2026-04-01T12:55:00Z"},{"value":"0.46832","scoring_system":"epss","scoring_elements":"0.97653","published_at":"2026-04-02T12:55:00Z"},{"value":"0.46832","scoring_system":"epss","scoring_elements":"0.97655","published_at":"2026-04-04T12:55:00Z"},{"value":"0.46832","scoring_system":"epss","scoring_elements":"0.97656","published_at":"2026-04-07T12:55:00Z"},{"value":"0.46832","scoring_system":"epss","scoring_elements":"0.9766","published_at":"2026-04-08T12:55:00Z"},{"value":"0.46832","scoring_system":"epss","scoring_elements":"0.97662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.46832","scoring_system":"epss","scoring_elements":"0.97665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.46832","scoring_system":"epss","scoring_elements":"0.97667","published_at":"2026-04-12T12:55:00Z"},{"value":"0.46832","scoring_system":"epss","scoring_elements":"0.97668","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1382294","reference_id":"1382294","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1382294"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839260","reference_id":"839260","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839260"},{"reference_url":"https://security.gentoo.org/glsa/201702-31","reference_id":"GLSA-201702-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-31"},{"reference_url":"https://usn.ubuntu.com/3148-1/","reference_id":"USN-3148-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3148-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923056?format=json","purl":"pkg:deb/debian/ghostscript@9.19~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.19~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2016-7976"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ahc-7gjf-xkc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51903?format=json","vulnerability_id":"VCID-6xjs-kc8z-ukb8","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9620.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9620","reference_id":"","reference_type":"","scores":[{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71256","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76842","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76823","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76865","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76893","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76873","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76807","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475829","reference_id":"1475829","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475829"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879","reference_id":"869879","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9620"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xjs-kc8z-ukb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79475?format=json","vulnerability_id":"VCID-6zft-uqxb-pkh2","summary":"ghostscript: Mishandling of .completefont (incomplete fix for CVE-2019-3839)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25059.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25059.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-25059","reference_id":"","reference_type":"","scores":[{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38661","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38811","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38801","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38813","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38749","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-25059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25059"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078491","reference_id":"2078491","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078491"},{"reference_url":"https://usn.ubuntu.com/5396-1/","reference_id":"USN-5396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5396-1/"},{"reference_url":"https://usn.ubuntu.com/5396-2/","reference_id":"USN-5396-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5396-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923070?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-25059"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6zft-uqxb-pkh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51933?format=json","vulnerability_id":"VCID-76r8-79qa-m7h3","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19409.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19409","reference_id":"","reference_type":"","scores":[{"value":"0.10203","scoring_system":"epss","scoring_elements":"0.93103","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10203","scoring_system":"epss","scoring_elements":"0.93113","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10203","scoring_system":"epss","scoring_elements":"0.93116","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10203","scoring_system":"epss","scoring_elements":"0.93115","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10203","scoring_system":"epss","scoring_elements":"0.93124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10203","scoring_system":"epss","scoring_elements":"0.93128","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10203","scoring_system":"epss","scoring_elements":"0.93133","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10203","scoring_system":"epss","scoring_elements":"0.93131","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1652583","reference_id":"1652583","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1652583"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3834","reference_id":"RHSA-2018:3834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3834"},{"reference_url":"https://usn.ubuntu.com/3831-1/","reference_id":"USN-3831-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3831-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923066?format=json","purl":"pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-19409"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-76r8-79qa-m7h3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60662?format=json","vulnerability_id":"VCID-79q2-phm8-e7cv","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16295.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16295.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16295","reference_id":"","reference_type":"","scores":[{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64381","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64419","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64434","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64447","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64406","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870179","reference_id":"1870179","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870179"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16295"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-79q2-phm8-e7cv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67454?format=json","vulnerability_id":"VCID-7anb-rnxg-97h8","summary":"Artifex Ghostscript: Artifex Ghostscript: Denial of Service via stack-based buffer overflow in pdf_write_cmap","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59798.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59798.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59798","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03631","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03654","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03622","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59798"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116444","reference_id":"1116444","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116444"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397225","reference_id":"2397225","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397225"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=0cae41b23a9669e801211dd4cf97b6dadd6dbdd7","reference_id":"?id=0cae41b23a9669e801211dd4cf97b6dadd6dbdd7","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:54:24Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=0cae41b23a9669e801211dd4cf97b6dadd6dbdd7"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708539","reference_id":"show_bug.cgi?id=708539","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:54:24Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708539"},{"reference_url":"https://usn.ubuntu.com/7782-1/","reference_id":"USN-7782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7782-1/"},{"reference_url":"https://usn.ubuntu.com/7904-1/","reference_id":"USN-7904-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7904-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923104?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923105?format=json","purl":"pkg:deb/debian/ghostscript@10.06.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.06.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-59798"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7anb-rnxg-97h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60664?format=json","vulnerability_id":"VCID-7ap3-6gs2-fbgs","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16297.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16297.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16297","reference_id":"","reference_type":"","scores":[{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62636","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62659","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68365","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68342","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68392","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68409","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68436","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68325","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870227","reference_id":"1870227","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870227"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16297"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ap3-6gs2-fbgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56851?format=json","vulnerability_id":"VCID-7u9a-5pkt-4fbf","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46956.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46956.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46956","reference_id":"","reference_type":"","scores":[{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55608","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55634","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5561","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55674","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55654","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46956"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325047","reference_id":"2325047","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325047"},{"reference_url":"https://security.gentoo.org/glsa/202501-06","reference_id":"GLSA-202501-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-06"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca","reference_id":"?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f4151f12db32cd3ed26c24327de714bf2c3ed6ca"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7422","reference_id":"RHSA-2025:7422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7499","reference_id":"RHSA-2025:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7499"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707895","reference_id":"show_bug.cgi?id=707895","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707895"},{"reference_url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/","reference_id":"suse-su-20243942-1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:58:48Z/"}],"url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/"},{"reference_url":"https://usn.ubuntu.com/7103-1/","reference_id":"USN-7103-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7103-1/"},{"reference_url":"https://usn.ubuntu.com/7138-1/","reference_id":"USN-7138-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7138-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923098?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923097?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923099?format=json","purl":"pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-46956"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7u9a-5pkt-4fbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76077?format=json","vulnerability_id":"VCID-7w82-m8sf-dbbg","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19475.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19475.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19475","reference_id":"","reference_type":"","scores":[{"value":"0.63587","scoring_system":"epss","scoring_elements":"0.984","published_at":"2026-04-01T12:55:00Z"},{"value":"0.63587","scoring_system":"epss","scoring_elements":"0.98403","published_at":"2026-04-02T12:55:00Z"},{"value":"0.63587","scoring_system":"epss","scoring_elements":"0.98406","published_at":"2026-04-04T12:55:00Z"},{"value":"0.63587","scoring_system":"epss","scoring_elements":"0.98408","published_at":"2026-04-07T12:55:00Z"},{"value":"0.63587","scoring_system":"epss","scoring_elements":"0.98411","published_at":"2026-04-08T12:55:00Z"},{"value":"0.63587","scoring_system":"epss","scoring_elements":"0.98412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.63587","scoring_system":"epss","scoring_elements":"0.98416","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1654459","reference_id":"1654459","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1654459"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0229","reference_id":"RHSA-2019:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0229"},{"reference_url":"https://usn.ubuntu.com/3831-1/","reference_id":"USN-3831-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3831-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923066?format=json","purl":"pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-19475"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7w82-m8sf-dbbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48790?format=json","vulnerability_id":"VCID-8hfa-4qua-tuab","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00047.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00047.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00048.html"},{"reference_url":"http://packetstormsecurity.com/files/151307/Ghostscript-Pseudo-Operator-Remote-Code-Execution.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/151307/Ghostscript-Pseudo-Operator-Remote-Code-Execution.html"},{"reference_url":"http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html"},{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6116.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6116.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6116","reference_id":"","reference_type":"","scores":[{"value":"0.67511","scoring_system":"epss","scoring_elements":"0.98562","published_at":"2026-04-01T12:55:00Z"},{"value":"0.67511","scoring_system":"epss","scoring_elements":"0.98576","published_at":"2026-04-13T12:55:00Z"},{"value":"0.67511","scoring_system":"epss","scoring_elements":"0.98568","published_at":"2026-04-07T12:55:00Z"},{"value":"0.67511","scoring_system":"epss","scoring_elements":"0.98571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.67511","scoring_system":"epss","scoring_elements":"0.98573","published_at":"2026-04-09T12:55:00Z"},{"value":"0.67511","scoring_system":"epss","scoring_elements":"0.98575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.67511","scoring_system":"epss","scoring_elements":"0.98564","published_at":"2026-04-02T12:55:00Z"},{"value":"0.67511","scoring_system":"epss","scoring_elements":"0.98566","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6116"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1729","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1729"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=700317","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=700317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6116"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00016.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N6T5L3SSJX2AVUPHP7GCPATFWUPKZT2/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N6T5L3SSJX2AVUPHP7GCPATFWUPKZT2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWVAVCDXBLPLJMVGNSKGGDTBEOHCJBKK/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWVAVCDXBLPLJMVGNSKGGDTBEOHCJBKK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVWXVKG72IGEJYHLWE6H3CGALHGFSGGY/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVWXVKG72IGEJYHLWE6H3CGALHGFSGGY/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/"},{"reference_url":"https://seclists.org/bugtraq/2019/Apr/4","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Apr/4"},{"reference_url":"https://www.debian.org/security/2019/dsa-4372","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4372"},{"reference_url":"https://www.exploit-db.com/exploits/46242/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/46242/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/01/23/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/01/23/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/03/21/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/03/21/1"},{"reference_url":"http://www.securityfocus.com/bid/106700","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106700"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1666636","reference_id":"1666636","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1666636"},{"reference_url":"https://security.archlinux.org/ASA-201901-18","reference_id":"ASA-201901-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201901-18"},{"reference_url":"https://security.archlinux.org/AVG-860","reference_id":"AVG-860","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-860"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1729&desc=2","reference_id":"CVE-2019-6116","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1729&desc=2"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/46242.txt","reference_id":"CVE-2019-6116","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/46242.txt"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6116","reference_id":"CVE-2019-6116","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6116"},{"reference_url":"https://security.gentoo.org/glsa/202004-03","reference_id":"GLSA-202004-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0229","reference_id":"RHSA-2019:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0229"},{"reference_url":"https://usn.ubuntu.com/3866-1/","reference_id":"USN-3866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923071?format=json","purl":"pkg:deb/debian/ghostscript@9.26a~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26a~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-6116"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8hfa-4qua-tuab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60669?format=json","vulnerability_id":"VCID-8wed-eqxt-pygs","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16302.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16302.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16302","reference_id":"","reference_type":"","scores":[{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73839","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73875","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73846","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73916","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73889","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870267","reference_id":"1870267","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870267"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16302"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8wed-eqxt-pygs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58216?format=json","vulnerability_id":"VCID-8wfs-knnp-8ub1","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27831.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27831.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27831","reference_id":"","reference_type":"","scores":[{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48492","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48488","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48511","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48485","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48438","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27831"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354963","reference_id":"2354963","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354963"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708132","reference_id":"show_bug.cgi?id=708132","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:39:16Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708132"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923101?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923100?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923102?format=json","purl":"pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-27831"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8wfs-knnp-8ub1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48761?format=json","vulnerability_id":"VCID-932v-xwug-nbfy","summary":"Multiple memory management errors in JasPer might lead to execution of\n    arbitrary code via jpeg2k files.","references":[{"reference_url":"http://bugs.gentoo.org/show_bug.cgi?id=222819","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.gentoo.org/show_bug.cgi?id=222819"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3520.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3520.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3520","reference_id":"","reference_type":"","scores":[{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86501","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86511","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.8653","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86528","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86558","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02999","scoring_system":"epss","scoring_elements":"0.86573","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520"},{"reference_url":"http://secunia.com/advisories/33173","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33173"},{"reference_url":"http://secunia.com/advisories/34391","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34391"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200812-18.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200812-18.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45621","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45621"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10141","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10141"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:142","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:142"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:144","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:144"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:164"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0012.html"},{"reference_url":"http://www.securityfocus.com/bid/31470","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31470"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606"},{"reference_url":"http://www.ubuntu.com/usn/USN-742-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-742-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=461476","reference_id":"461476","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=461476"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778","reference_id":"559778","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3520","reference_id":"CVE-2008-3520","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3520"},{"reference_url":"https://security.gentoo.org/glsa/200812-18","reference_id":"GLSA-200812-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200812-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0012","reference_id":"RHSA-2009:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0698","reference_id":"RHSA-2015:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0698"},{"reference_url":"https://usn.ubuntu.com/1317-1/","reference_id":"USN-1317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1317-1/"},{"reference_url":"https://usn.ubuntu.com/742-1/","reference_id":"USN-742-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/742-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923044?format=json","purl":"pkg:deb/debian/ghostscript@8.64~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2008-3520"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-932v-xwug-nbfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79246?format=json","vulnerability_id":"VCID-95yj-ph8u-2fbq","summary":"security update","references":[{"reference_url":"http://jvn.jp/en/jp/JVN52486659/index.html","reference_id":"","reference_type":"","scores":[],"url":"http://jvn.jp/en/jp/JVN52486659/index.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00050.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00050.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14869.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14869.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14869","reference_id":"","reference_type":"","scores":[{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50398","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50486","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50529","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50506","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50454","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50482","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14869"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=701841","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=701841"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14869","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14869"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=485904772c5f","reference_id":"","reference_type":"","scores":[],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=485904772c5f"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Q4E3OTDAJRSUCOBTDQO7Y5UTE2FFMLF/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Q4E3OTDAJRSUCOBTDQO7Y5UTE2FFMLF/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HC4REO73BEJOJAU7NHFHJECAUAYJUE3H/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HC4REO73BEJOJAU7NHFHJECAUAYJUE3H/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IX55AEDERTDFEZAROKZW64MZRPLINEGI/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IX55AEDERTDFEZAROKZW64MZRPLINEGI/"},{"reference_url":"https://seclists.org/bugtraq/2019/Nov/27","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Nov/27"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/11/15/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/11/15/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1768911","reference_id":"1768911","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1768911"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944760","reference_id":"944760","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944760"},{"reference_url":"https://security.archlinux.org/AVG-1069","reference_id":"AVG-1069","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1069"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14869","reference_id":"CVE-2019-14869","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3888","reference_id":"RHSA-2019:3888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3890","reference_id":"RHSA-2019:3890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0222","reference_id":"RHSA-2020:0222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0222"},{"reference_url":"https://usn.ubuntu.com/4193-1/","reference_id":"USN-4193-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4193-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923069?format=json","purl":"pkg:deb/debian/ghostscript@9.50~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.50~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-14869"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-95yj-ph8u-2fbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73595?format=json","vulnerability_id":"VCID-98kc-jhsa-ykh9","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18073.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18073.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18073","reference_id":"","reference_type":"","scores":[{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51357","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51487","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51466","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51407","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51434","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51447","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51444","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1642584","reference_id":"1642584","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1642584"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910758","reference_id":"910758","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910758"},{"reference_url":"https://security.archlinux.org/ASA-201811-3","reference_id":"ASA-201811-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-3"},{"reference_url":"https://security.archlinux.org/AVG-786","reference_id":"AVG-786","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3834","reference_id":"RHSA-2018:3834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3834"},{"reference_url":"https://usn.ubuntu.com/3803-1/","reference_id":"USN-3803-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3803-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923065?format=json","purl":"pkg:deb/debian/ghostscript@9.25~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.25~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-18073"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-98kc-jhsa-ykh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56846?format=json","vulnerability_id":"VCID-9q8n-jfqs-bkg6","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46952.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46952.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46952","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21684","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21634","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21711","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21768","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21781","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21741","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325041","reference_id":"2325041","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325041"},{"reference_url":"https://security.gentoo.org/glsa/202501-06","reference_id":"GLSA-202501-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-06"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b1f0827c30f59a2dcbc8a39e42cace7a1de35f7f","reference_id":"?id=b1f0827c30f59a2dcbc8a39e42cace7a1de35f7f","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:27:55Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b1f0827c30f59a2dcbc8a39e42cace7a1de35f7f"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:27:55Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7422","reference_id":"RHSA-2025:7422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7499","reference_id":"RHSA-2025:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7499"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708001","reference_id":"show_bug.cgi?id=708001","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:27:55Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708001"},{"reference_url":"https://usn.ubuntu.com/7103-1/","reference_id":"USN-7103-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7103-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923097?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923099?format=json","purl":"pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-46952"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9q8n-jfqs-bkg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75003?format=json","vulnerability_id":"VCID-9sqj-kk7j-43fg","summary":"ghostscript: heap buffer overflow via the PDFPassword parameter","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29509.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29509.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29509","reference_id":"","reference_type":"","scores":[{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84243","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84187","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84205","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84206","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84233","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84246","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29509"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295628","reference_id":"2295628","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295628"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/07/03/7","reference_id":"7","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:36:26Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/07/03/7"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Bh=917b3a71fb20748965254631199ad98210d6c2fb","reference_id":"?p=ghostpdl.git%3Bh=917b3a71fb20748965254631199ad98210d6c2fb","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:36:26Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Bh=917b3a71fb20748965254631199ad98210d6c2fb"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510","reference_id":"show_bug.cgi?id=707510","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:36:26Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510"},{"reference_url":"https://usn.ubuntu.com/6897-1/","reference_id":"USN-6897-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6897-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923093?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923094?format=json","purl":"pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-29509"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9sqj-kk7j-43fg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84665?format=json","vulnerability_id":"VCID-a9h3-mjwf-wuh7","summary":"ghostscript: Heap-buffer overflow in the fill_threshold_buffer function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10317.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10317.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10317","reference_id":"","reference_type":"","scores":[{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74605","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.7465","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74641","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74655","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74678","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74658","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74609","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74635","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.7461","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10317"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=697459","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=697459"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10317"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/97410","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97410"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441575","reference_id":"1441575","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441575"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860869","reference_id":"860869","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860869"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10317","reference_id":"CVE-2016-10317","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10317"},{"reference_url":"https://usn.ubuntu.com/3636-1/","reference_id":"USN-3636-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3636-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923059?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2016-10317"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a9h3-mjwf-wuh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60663?format=json","vulnerability_id":"VCID-ae31-n66y-akcg","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16296.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16296.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16296","reference_id":"","reference_type":"","scores":[{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62704","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62761","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62791","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62807","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62824","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62831","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870175","reference_id":"1870175","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870175"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16296"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ae31-n66y-akcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60676?format=json","vulnerability_id":"VCID-b1zp-sfch-u3c1","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16309.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16309.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16309","reference_id":"","reference_type":"","scores":[{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80902","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80933","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.8093","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80965","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80968","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01475","scoring_system":"epss","scoring_elements":"0.80959","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870248","reference_id":"1870248","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870248"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16309"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b1zp-sfch-u3c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56845?format=json","vulnerability_id":"VCID-barv-t623-h3e5","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46951.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46951.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46951","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33919","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34027","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34057","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33987","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33985","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33942","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46951"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325043","reference_id":"2325043","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325043"},{"reference_url":"https://security.gentoo.org/glsa/202501-06","reference_id":"GLSA-202501-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-06"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f49812186baa7d1362880673408a6fbe8719b4f8","reference_id":"?id=f49812186baa7d1362880673408a6fbe8719b4f8","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f49812186baa7d1362880673408a6fbe8719b4f8"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7422","reference_id":"RHSA-2025:7422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7499","reference_id":"RHSA-2025:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7499"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707991","reference_id":"show_bug.cgi?id=707991","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707991"},{"reference_url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/","reference_id":"suse-su-20243942-1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:49Z/"}],"url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/"},{"reference_url":"https://usn.ubuntu.com/7103-1/","reference_id":"USN-7103-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7103-1/"},{"reference_url":"https://usn.ubuntu.com/7138-1/","reference_id":"USN-7138-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7138-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923098?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923097?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923099?format=json","purl":"pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-46951"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-barv-t623-h3e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32117?format=json","vulnerability_id":"VCID-bhab-6cdq-rfew","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which can resulting in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10220.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10220.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10220","reference_id":"","reference_type":"","scores":[{"value":"0.00977","scoring_system":"epss","scoring_elements":"0.76651","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00977","scoring_system":"epss","scoring_elements":"0.76717","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00977","scoring_system":"epss","scoring_elements":"0.76697","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00977","scoring_system":"epss","scoring_elements":"0.76709","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00977","scoring_system":"epss","scoring_elements":"0.76737","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00977","scoring_system":"epss","scoring_elements":"0.76655","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00977","scoring_system":"epss","scoring_elements":"0.76685","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00977","scoring_system":"epss","scoring_elements":"0.76665","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10220"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=697450","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=697450"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2017/dsa-3838","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3838"},{"reference_url":"http://www.ghostscript.com/cgi-bin/findgit.cgi?daf85701dab05f17e924a48a81edc9195b4a04e8","reference_id":"","reference_type":"","scores":[],"url":"http://www.ghostscript.com/cgi-bin/findgit.cgi?daf85701dab05f17e924a48a81edc9195b4a04e8"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441571","reference_id":"1441571","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441571"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859694","reference_id":"859694","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859694"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10220","reference_id":"CVE-2016-10220","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10220"},{"reference_url":"https://security.gentoo.org/glsa/201708-06","reference_id":"GLSA-201708-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201708-06"},{"reference_url":"https://usn.ubuntu.com/3272-1/","reference_id":"USN-3272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3272-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923058?format=json","purl":"pkg:deb/debian/ghostscript@9.20~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.20~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2016-10220"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bhab-6cdq-rfew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58215?format=json","vulnerability_id":"VCID-bnpf-udu2-hqbk","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27830.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27830","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07566","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0766","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07661","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07648","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07642","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27830"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354953","reference_id":"2354953","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354953"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708241","reference_id":"show_bug.cgi?id=708241","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:36:52Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708241"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923101?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923100?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923102?format=json","purl":"pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-27830"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bnpf-udu2-hqbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80954?format=json","vulnerability_id":"VCID-bp4n-15wn-hbcf","summary":"ghostscript: use-after-free vulnerability in igc_reloc_struct_ptr() could result in DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14373.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14373.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14373","reference_id":"","reference_type":"","scores":[{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37706","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37888","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37912","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37841","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37854","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37832","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37807","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14373"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1873239","reference_id":"1873239","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1873239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923066?format=json","purl":"pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-14373"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bp4n-15wn-hbcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58221?format=json","vulnerability_id":"VCID-c6ms-5wr2-kbfj","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27835.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27835.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27835","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07566","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0766","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07661","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07648","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07642","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354947","reference_id":"2354947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354947"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708131","reference_id":"show_bug.cgi?id=708131","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:36:46Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708131"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"},{"reference_url":"https://usn.ubuntu.com/7623-1/","reference_id":"USN-7623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7623-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923101?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923100?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923102?format=json","purl":"pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-27835"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c6ms-5wr2-kbfj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76080?format=json","vulnerability_id":"VCID-cb98-64e8-afcm","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19477.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19477.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19477","reference_id":"","reference_type":"","scores":[{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74378","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74382","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74409","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74385","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74417","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74434","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74427","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1654468","reference_id":"1654468","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1654468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0229","reference_id":"RHSA-2019:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0229"},{"reference_url":"https://usn.ubuntu.com/3831-1/","reference_id":"USN-3831-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3831-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923066?format=json","purl":"pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-19477"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cb98-64e8-afcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51915?format=json","vulnerability_id":"VCID-cwmx-9rrx-efcp","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15910.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15910.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15910","reference_id":"","reference_type":"","scores":[{"value":"0.04834","scoring_system":"epss","scoring_elements":"0.8948","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04834","scoring_system":"epss","scoring_elements":"0.89484","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04834","scoring_system":"epss","scoring_elements":"0.89496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04834","scoring_system":"epss","scoring_elements":"0.89512","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04834","scoring_system":"epss","scoring_elements":"0.89516","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04834","scoring_system":"epss","scoring_elements":"0.89524","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04834","scoring_system":"epss","scoring_elements":"0.89521","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04834","scoring_system":"epss","scoring_elements":"0.89517","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1619751","reference_id":"1619751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1619751"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332","reference_id":"907332","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2918","reference_id":"RHSA-2018:2918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2918"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923064?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-15910"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cwmx-9rrx-efcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32116?format=json","vulnerability_id":"VCID-d73r-gbc9-xkff","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which can resulting in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10219.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10219.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10219","reference_id":"","reference_type":"","scores":[{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68874","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.6894","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68962","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68984","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.6897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68891","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68893","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68943","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10219"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=697453","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=697453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2017/dsa-3838","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3838"},{"reference_url":"http://www.ghostscript.com/cgi-bin/findgit.cgi?4bef1a1d32e29b68855616020dbff574b9cda08f","reference_id":"","reference_type":"","scores":[],"url":"http://www.ghostscript.com/cgi-bin/findgit.cgi?4bef1a1d32e29b68855616020dbff574b9cda08f"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441569","reference_id":"1441569","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441569"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859666","reference_id":"859666","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859666"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10219","reference_id":"CVE-2016-10219","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10219"},{"reference_url":"https://security.gentoo.org/glsa/201708-06","reference_id":"GLSA-201708-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201708-06"},{"reference_url":"https://usn.ubuntu.com/3272-1/","reference_id":"USN-3272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3272-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923058?format=json","purl":"pkg:deb/debian/ghostscript@9.20~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.20~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2016-10219"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d73r-gbc9-xkff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47317?format=json","vulnerability_id":"VCID-d7z5-jnez-xfaq","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3743.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3743.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3743","reference_id":"","reference_type":"","scores":[{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88338","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88284","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88306","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.8831","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.8833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88336","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03936","scoring_system":"epss","scoring_elements":"0.88346","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3743"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-17.xml"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2012-0095.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2012-0095.html"},{"reference_url":"http://www.kb.cert.org/vuls/id/644319","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/644319"},{"reference_url":"http://www.kb.cert.org/vuls/id/JALR-87YGN8","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/JALR-87YGN8"},{"reference_url":"http://www.securityfocus.com/archive/1/514892/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/514892/100/0/threaded"},{"reference_url":"http://www.securitytracker.com/id?1024785","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1024785"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=627902","reference_id":"627902","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=627902"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-3743","reference_id":"CVE-2009-3743","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-3743"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0095","reference_id":"RHSA-2012:0095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0095"},{"reference_url":"https://usn.ubuntu.com/1317-1/","reference_id":"USN-1317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1317-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923048?format=json","purl":"pkg:deb/debian/ghostscript@8.71~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.71~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2009-3743"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d7z5-jnez-xfaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51894?format=json","vulnerability_id":"VCID-dax4-v297-afhg","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11714.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11714.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11714","reference_id":"","reference_type":"","scores":[{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56211","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56391","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56367","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56324","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56375","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56381","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1476192","reference_id":"1476192","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1476192"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869977","reference_id":"869977","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869977"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-11714"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dax4-v297-afhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51931?format=json","vulnerability_id":"VCID-dr9w-w81e-qugn","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16802.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16802.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16802","reference_id":"","reference_type":"","scores":[{"value":"0.00971","scoring_system":"epss","scoring_elements":"0.76579","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00971","scoring_system":"epss","scoring_elements":"0.76582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00971","scoring_system":"epss","scoring_elements":"0.76611","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00971","scoring_system":"epss","scoring_elements":"0.76592","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00971","scoring_system":"epss","scoring_elements":"0.76623","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00971","scoring_system":"epss","scoring_elements":"0.76635","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00971","scoring_system":"epss","scoring_elements":"0.76661","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00971","scoring_system":"epss","scoring_elements":"0.76641","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00971","scoring_system":"epss","scoring_elements":"0.76632","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1627959","reference_id":"1627959","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1627959"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3834","reference_id":"RHSA-2018:3834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3834"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923061?format=json","purl":"pkg:deb/debian/ghostscript@9.25~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.25~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-16802"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dr9w-w81e-qugn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/141661?format=json","vulnerability_id":"VCID-dyk7-kdb2-e3ap","summary":"Heap-based buffer overflow in gdevwpr2.c in Ghostscript 9.04, when processing the OutputFile device parameter, allows user-assisted remote attackers to execute arbitrary code via a long file name in a PostScript document.  NOTE: as of 20120314, the developer was not able to reproduce the issue and disputed it","references":[{"reference_url":"http://bugs.ghostscript.com/show_bug.cgi?id=692856","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.ghostscript.com/show_bug.cgi?id=692856"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4875","reference_id":"","reference_type":"","scores":[{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92756","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92727","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92734","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.9274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92747","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92751","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92757","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92755","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4875"},{"reference_url":"http://secunia.com/advisories/47855","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/47855"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/74554","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/74554"},{"reference_url":"http://www.securityfocus.com/bid/52864","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/52864"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4875","reference_id":"CVE-2012-4875","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4875"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2012-4875"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dyk7-kdb2-e3ap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78149?format=json","vulnerability_id":"VCID-e8bh-th45-vfgg","summary":"ghostscript: Heap buffer overflow in clj_media_size function in devices/gdevclj.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21890.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21890.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-21890","reference_id":"","reference_type":"","scores":[{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.7909","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79097","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79151","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79166","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79123","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79134","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-21890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21890"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235002","reference_id":"2235002","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2235002"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-04T16:13:44Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=701846","reference_id":"show_bug.cgi?id=701846","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-04T16:13:44Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=701846"},{"reference_url":"https://usn.ubuntu.com/6364-1/","reference_id":"USN-6364-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6364-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-21890"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e8bh-th45-vfgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51900?format=json","vulnerability_id":"VCID-ehmh-tjv3-ufhe","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9618.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9618.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9618","reference_id":"","reference_type":"","scores":[{"value":"0.00885","scoring_system":"epss","scoring_elements":"0.75431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80252","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80272","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.8026","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80288","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80298","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80302","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80245","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9618"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475827","reference_id":"1475827","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475827"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879","reference_id":"869879","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9618"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ehmh-tjv3-ufhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48787?format=json","vulnerability_id":"VCID-eqhh-t7qd-vuav","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=cd1b1cacadac2479e291efe611979bdc1b3bdb19","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=cd1b1cacadac2479e291efe611979bdc1b3bdb19"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html"},{"reference_url":"https://access.redhat.com/errata/RHBA-2019:2824","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:2824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2594","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2594"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14817.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14817.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14817","reference_id":"","reference_type":"","scores":[{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58231","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58337","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58365","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58371","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58388","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58317","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14817"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14817","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/15","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/15"},{"reference_url":"https://www.debian.org/security/2019/dsa-4518","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4518"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1744042","reference_id":"1744042","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1744042"},{"reference_url":"https://security.archlinux.org/ASA-201911-5","reference_id":"ASA-201911-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-5"},{"reference_url":"https://security.archlinux.org/AVG-1031","reference_id":"AVG-1031","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1031"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14817","reference_id":"CVE-2019-14817","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14817"},{"reference_url":"https://security.gentoo.org/glsa/202004-03","reference_id":"GLSA-202004-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2534","reference_id":"RHSA-2019:2534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2586","reference_id":"RHSA-2019:2586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2591","reference_id":"RHSA-2019:2591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2591"},{"reference_url":"https://usn.ubuntu.com/4111-1/","reference_id":"USN-4111-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4111-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923068?format=json","purl":"pkg:deb/debian/ghostscript@9.28~~rc2~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.28~~rc2~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-14817"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eqhh-t7qd-vuav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56847?format=json","vulnerability_id":"VCID-eypv-n5ea-abgn","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46953.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46953.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46953","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30776","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30592","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30651","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30684","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30644","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46953"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325045","reference_id":"2325045","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325045"},{"reference_url":"https://security.gentoo.org/glsa/202501-06","reference_id":"GLSA-202501-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-06"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=1f21a45df0fa3abec4cff12951022b192dda3c00","reference_id":"?id=1f21a45df0fa3abec4cff12951022b192dda3c00","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=1f21a45df0fa3abec4cff12951022b192dda3c00"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7422","reference_id":"RHSA-2025:7422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7499","reference_id":"RHSA-2025:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7499"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707793","reference_id":"show_bug.cgi?id=707793","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707793"},{"reference_url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/","reference_id":"suse-su-20243942-1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T19:59:32Z/"}],"url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/"},{"reference_url":"https://usn.ubuntu.com/7103-1/","reference_id":"USN-7103-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7103-1/"},{"reference_url":"https://usn.ubuntu.com/7138-1/","reference_id":"USN-7138-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7138-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923098?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923097?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923099?format=json","purl":"pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-46953"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eypv-n5ea-abgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60673?format=json","vulnerability_id":"VCID-fehm-g4fq-pfb2","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16306.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16306.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16306","reference_id":"","reference_type":"","scores":[{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82582","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82597","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82634","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82642","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01771","scoring_system":"epss","scoring_elements":"0.82649","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870165","reference_id":"1870165","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870165"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16306"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fehm-g4fq-pfb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75004?format=json","vulnerability_id":"VCID-fqa1-u16c-qyha","summary":"ghostscript: stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29507.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29507.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29507","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30299","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30348","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3026","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30263","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3022","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29507"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295647","reference_id":"2295647","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295647"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/07/03/7","reference_id":"7","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:10:58Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/07/03/7"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=7745dbe24514","reference_id":"?p=ghostpdl.git%3Ba=commitdiff%3Bh=7745dbe24514","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:10:58Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=7745dbe24514"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510","reference_id":"show_bug.cgi?id=707510","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:10:58Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510"},{"reference_url":"https://usn.ubuntu.com/6897-1/","reference_id":"USN-6897-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6897-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923093?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923094?format=json","purl":"pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-29507"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fqa1-u16c-qyha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47315?format=json","vulnerability_id":"VCID-frrd-yd7x-jkdh","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0196.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0196","reference_id":"","reference_type":"","scores":[{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93783","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93792","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93805","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93817","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12164","scoring_system":"epss","scoring_elements":"0.93822","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0196"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=493379","reference_id":"493379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=493379"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524803","reference_id":"524803","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524803"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0421","reference_id":"RHSA-2009:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0421"},{"reference_url":"https://usn.ubuntu.com/757-1/","reference_id":"USN-757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/757-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923046?format=json","purl":"pkg:deb/debian/ghostscript@8.64~dfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2009-0196"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-frrd-yd7x-jkdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51914?format=json","vulnerability_id":"VCID-fzq2-pf9t-6kcp","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15909.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15909.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15909","reference_id":"","reference_type":"","scores":[{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84586","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.846","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.8462","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.8465","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84668","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02274","scoring_system":"epss","scoring_elements":"0.84658","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1621361","reference_id":"1621361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1621361"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332","reference_id":"907332","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3650","reference_id":"RHSA-2018:3650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3650"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923064?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-15909"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fzq2-pf9t-6kcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51916?format=json","vulnerability_id":"VCID-g57e-a8z2-k3dx","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15911.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15911.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15911","reference_id":"","reference_type":"","scores":[{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85805","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85857","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85867","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85882","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85874","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625832","reference_id":"1625832","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625832"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332","reference_id":"907332","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3834","reference_id":"RHSA-2018:3834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3834"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923064?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-15911"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g57e-a8z2-k3dx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60657?format=json","vulnerability_id":"VCID-ge8e-fm7t-gqgj","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16290.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16290.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16290","reference_id":"","reference_type":"","scores":[{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.8059","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870149","reference_id":"1870149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870149"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16290"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ge8e-fm7t-gqgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48789?format=json","vulnerability_id":"VCID-gjj2-k1mt-sbgv","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00018.html"},{"reference_url":"http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0652","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0652"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3838.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3838.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3838","reference_id":"","reference_type":"","scores":[{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80133","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80181","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80177","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80204","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80189","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.8014","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.8016","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3838"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=700576","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=700576"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3838","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3838"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00021.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A43SRQAEHQCKSEMIBINHUNIGHTDCZD7F/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A43SRQAEHQCKSEMIBINHUNIGHTDCZD7F/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANBSCZABXQUEQWIKNWJ35IYX24M227EI/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANBSCZABXQUEQWIKNWJ35IYX24M227EI/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVERLGEU3OV6RNZ2SIBXREWD3BF5H23N/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVERLGEU3OV6RNZ2SIBXREWD3BF5H23N/"},{"reference_url":"https://seclists.org/bugtraq/2019/Apr/28","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Apr/28"},{"reference_url":"https://seclists.org/bugtraq/2019/Apr/4","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Apr/4"},{"reference_url":"https://www.debian.org/security/2019/dsa-4432","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4432"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1677581","reference_id":"1677581","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1677581"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925257","reference_id":"925257","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925257"},{"reference_url":"https://security.archlinux.org/ASA-201904-5","reference_id":"ASA-201904-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201904-5"},{"reference_url":"https://security.archlinux.org/AVG-929","reference_id":"AVG-929","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-929"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3838","reference_id":"CVE-2019-3838","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3838"},{"reference_url":"https://security.gentoo.org/glsa/202004-03","reference_id":"GLSA-202004-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0633","reference_id":"RHSA-2019:0633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0633"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0971","reference_id":"RHSA-2019:0971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0971"},{"reference_url":"https://usn.ubuntu.com/3915-1/","reference_id":"USN-3915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3915-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923070?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-3838"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gjj2-k1mt-sbgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51908?format=json","vulnerability_id":"VCID-gmkv-up69-u7c1","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9740.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9740.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9740","reference_id":"","reference_type":"","scores":[{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61024","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61147","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9740"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475836","reference_id":"1475836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475836"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879","reference_id":"869879","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9740"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gmkv-up69-u7c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58218?format=json","vulnerability_id":"VCID-gv9z-e7t9-m7g6","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27832.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27832.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27832","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33978","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33938","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33936","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33894","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34009","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33863","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33906","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27832"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27832","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27832"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354949","reference_id":"2354949","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354949"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:21915","reference_id":"RHSA-2025:21915","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:21915"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22869","reference_id":"RHSA-2025:22869","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23153","reference_id":"RHSA-2025:23153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7586","reference_id":"RHSA-2025:7586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7593","reference_id":"RHSA-2025:7593","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8421","reference_id":"RHSA-2025:8421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8421"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708133","reference_id":"show_bug.cgi?id=708133","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:39:13Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708133"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"},{"reference_url":"https://usn.ubuntu.com/7623-1/","reference_id":"USN-7623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7623-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923101?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923100?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923102?format=json","purl":"pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-27832"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gv9z-e7t9-m7g6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78080?format=json","vulnerability_id":"VCID-h7py-se4n-6bdy","summary":"Ghostscript: GhostPDL can lead to remote code execution via crafted PostScript documents","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43115.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43115.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43115","reference_id":"","reference_type":"","scores":[{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95711","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95718","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95721","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.9573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95733","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95737","published_at":"2026-04-11T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21677","scoring_system":"epss","scoring_elements":"0.95738","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43115"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43115","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43115"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241108","reference_id":"2241108","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5868","reference_id":"RHSA-2023:5868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6265","reference_id":"RHSA-2023:6265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6732","reference_id":"RHSA-2023:6732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6732"},{"reference_url":"https://usn.ubuntu.com/6433-1/","reference_id":"USN-6433-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6433-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923088?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923087?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923089?format=json","purl":"pkg:deb/debian/ghostscript@10.02.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.02.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2023-43115"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h7py-se4n-6bdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61674?format=json","vulnerability_id":"VCID-hc8b-qzqp-pqdn","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33870.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33870.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33870","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23384","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23335","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23458","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23477","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23439","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23516","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23552","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/06/28/2","reference_id":"2","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:38:36Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/06/28/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293959","reference_id":"2293959","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293959"},{"reference_url":"https://security.gentoo.org/glsa/202409-03","reference_id":"GLSA-202409-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6197","reference_id":"RHSA-2024:6197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6466","reference_id":"RHSA-2024:6466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6466"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707686","reference_id":"show_bug.cgi?id=707686","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:38:36Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707686"},{"reference_url":"https://usn.ubuntu.com/6835-1/","reference_id":"USN-6835-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6835-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923092?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923096?format=json","purl":"pkg:deb/debian/ghostscript@10.03.1~dfsg~git20240518-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.1~dfsg~git20240518-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-33870"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hc8b-qzqp-pqdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93152?format=json","vulnerability_id":"VCID-hejr-fkh9-f3hs","summary":"Artifex Ghostscript 9.22 is affected by: Obtain Information. The impact is: obtain sensitive information. The component is: affected source code file, affected function, affected executable, affected libga (imagemagick used that). The attack vector is: Someone must open a postscript file though ghostscript. Because of imagemagick also use libga, so it was affected as well.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15652","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50047","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.49997","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50035","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50013","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50068","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50061","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50078","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50051","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15652"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923061?format=json","purl":"pkg:deb/debian/ghostscript@9.25~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.25~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-15652"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hejr-fkh9-f3hs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61390?format=json","vulnerability_id":"VCID-hptz-wfa8-y7cp","summary":"Multiple integer overflows in the Ghostscript ICC library might allow for\n    user-assisted execution of arbitrary code.","references":[{"reference_url":"http://bugs.gentoo.org/show_bug.cgi?id=261087","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.gentoo.org/show_bug.cgi?id=261087"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0583.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0583.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0583","reference_id":"","reference_type":"","scores":[{"value":"0.04568","scoring_system":"epss","scoring_elements":"0.89207","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04568","scoring_system":"epss","scoring_elements":"0.89156","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04568","scoring_system":"epss","scoring_elements":"0.89163","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04568","scoring_system":"epss","scoring_elements":"0.89178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04568","scoring_system":"epss","scoring_elements":"0.89181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04568","scoring_system":"epss","scoring_elements":"0.89199","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04568","scoring_system":"epss","scoring_elements":"0.89203","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04568","scoring_system":"epss","scoring_elements":"0.89213","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04568","scoring_system":"epss","scoring_elements":"0.89209","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583"},{"reference_url":"http://secunia.com/advisories/34266","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34266"},{"reference_url":"http://secunia.com/advisories/34373","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34373"},{"reference_url":"http://secunia.com/advisories/34381","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34381"},{"reference_url":"http://secunia.com/advisories/34393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34393"},{"reference_url":"http://secunia.com/advisories/34398","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34398"},{"reference_url":"http://secunia.com/advisories/34418","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34418"},{"reference_url":"http://secunia.com/advisories/34437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34437"},{"reference_url":"http://secunia.com/advisories/34443","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34443"},{"reference_url":"http://secunia.com/advisories/34469","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34469"},{"reference_url":"http://secunia.com/advisories/34729","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34729"},{"reference_url":"http://secunia.com/advisories/35559","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35559"},{"reference_url":"http://secunia.com/advisories/35569","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35569"},{"reference_url":"http://securitytracker.com/id?1021868","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1021868"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49329","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49329"},{"reference_url":"https://issues.rpath.com/browse/RPL-2991","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2991"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10795","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10795"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050"},{"reference_url":"http://www.auscert.org.au/render.html?it=10666","reference_id":"","reference_type":"","scores":[],"url":"http://www.auscert.org.au/render.html?it=10666"},{"reference_url":"http://www.debian.org/security/2009/dsa-1746","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1746"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:095","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:096","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:096"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0345.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0345.html"},{"reference_url":"http://www.securityfocus.com/archive/1/501994/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/501994/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/34184","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/34184"},{"reference_url":"http://www.ubuntu.com/usn/USN-743-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-743-1"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0776","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0776"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0777","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0777"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0816","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0816"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1708","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1708"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=487742","reference_id":"487742","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=487742"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522416","reference_id":"522416","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522416"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522448","reference_id":"522448","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522448"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:argyllcms:argyllcms:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:argyllcms:argyllcms:0.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:argyllcms:argyllcms:0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:argyllcms:argyllcms:0.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:argyllcms:argyllcms:0.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:argyllcms:argyllcms:0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:argyllcms:argyllcms:0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.7.0:beta_8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:argyllcms:argyllcms:0.7.0:beta_8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:0.7.0:beta_8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:argyllcms:argyllcms:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:argyllcms:argyllcms:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:argyllcms:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:7.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:7.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:7.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0583","reference_id":"CVE-2009-0583","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0583"},{"reference_url":"https://security.gentoo.org/glsa/200903-37","reference_id":"GLSA-200903-37","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-37"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0345","reference_id":"RHSA-2009:0345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0345"},{"reference_url":"https://usn.ubuntu.com/743-1/","reference_id":"USN-743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/743-1/"},{"reference_url":"https://usn.ubuntu.com/757-1/","reference_id":"USN-757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/757-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923046?format=json","purl":"pkg:deb/debian/ghostscript@8.64~dfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2009-0583"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hptz-wfa8-y7cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60678?format=json","vulnerability_id":"VCID-ht37-jj18-t3c5","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17538.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17538.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-17538","reference_id":"","reference_type":"","scores":[{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.7154","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71565","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71577","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71588","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71596","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-17538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870249","reference_id":"1870249","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870249"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-17538"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ht37-jj18-t3c5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60667?format=json","vulnerability_id":"VCID-hy2v-rkzm-nka1","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16300.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16300.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16300","reference_id":"","reference_type":"","scores":[{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77947","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870169","reference_id":"1870169","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870169"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16300"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hy2v-rkzm-nka1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32122?format=json","vulnerability_id":"VCID-j67r-c72d-j7a6","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which can resulting in the execution of arbitrary code.","references":[{"reference_url":"http://openwall.com/lists/oss-security/2017/04/28/2","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T20:44:47Z/"}],"url":"http://openwall.com/lists/oss-security/2017/04/28/2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8291.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8291.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8291","reference_id":"","reference_type":"","scores":[{"value":"0.92862","scoring_system":"epss","scoring_elements":"0.99768","published_at":"2026-04-11T12:55:00Z"},{"value":"0.92862","scoring_system":"epss","scoring_elements":"0.99766","published_at":"2026-04-01T12:55:00Z"},{"value":"0.92862","scoring_system":"epss","scoring_elements":"0.99767","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8291"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=697808","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T20:44:47Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=697808"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1036453","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T20:44:47Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1036453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=04b37bbce174eed24edec7ad5b920eb93db4d47d","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T20:44:47Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=04b37bbce174eed24edec7ad5b920eb93db4d47d"},{"reference_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-8291","reference_id":"","reference_type":"","scores":[],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-8291"},{"reference_url":"https://www.exploit-db.com/exploits/41955/","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T20:44:47Z/"}],"url":"https://www.exploit-db.com/exploits/41955/"},{"reference_url":"http://www.debian.org/security/2017/dsa-3838","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T20:44:47Z/"}],"url":"http://www.debian.org/security/2017/dsa-3838"},{"reference_url":"http://www.securityfocus.com/bid/98476","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T20:44:47Z/"}],"url":"http://www.securityfocus.com/bid/98476"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1446063","reference_id":"1446063","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T20:44:47Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1446063"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861295","reference_id":"861295","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861295"},{"reference_url":"https://security.archlinux.org/ASA-201705-3","reference_id":"ASA-201705-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201705-3"},{"reference_url":"https://security.archlinux.org/AVG-256","reference_id":"AVG-256","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-256"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://github.com/rapid7/metasploit-framework/blob/03e4ee91c2473775c2a8f28aa36c2023da2854bf/modules/exploits/unix/fileformat/ghostscript_type_confusion.rb","reference_id":"CVE-2017-8291","reference_type":"exploit","scores":[],"url":"https://github.com/rapid7/metasploit-framework/blob/03e4ee91c2473775c2a8f28aa36c2023da2854bf/modules/exploits/unix/fileformat/ghostscript_type_confusion.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41955.rb","reference_id":"CVE-2017-8291","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41955.rb"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8291","reference_id":"CVE-2017-8291","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8291"},{"reference_url":"https://security.gentoo.org/glsa/201708-06","reference_id":"GLSA-201708-06","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T20:44:47Z/"}],"url":"https://security.gentoo.org/glsa/201708-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1230","reference_id":"RHSA-2017:1230","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T20:44:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1230"},{"reference_url":"https://usn.ubuntu.com/3272-1/","reference_id":"USN-3272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3272-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923058?format=json","purl":"pkg:deb/debian/ghostscript@9.20~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.20~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-8291"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j67r-c72d-j7a6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51919?format=json","vulnerability_id":"VCID-jwv8-hkfn-a7gx","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16511.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16511","reference_id":"","reference_type":"","scores":[{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58778","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58852","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58875","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58843","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58895","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58901","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58918","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.589","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58881","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1621359","reference_id":"1621359","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1621359"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332","reference_id":"907332","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3650","reference_id":"RHSA-2018:3650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3650"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923064?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-16511"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jwv8-hkfn-a7gx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58223?format=json","vulnerability_id":"VCID-jxhs-q6yu-muft","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27837.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27837.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27837","reference_id":"","reference_type":"","scores":[{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60316","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60365","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60381","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60401","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60368","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27837"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354961","reference_id":"2354961","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354961"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-27837"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jxhs-q6yu-muft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47322?format=json","vulnerability_id":"VCID-jzm6-e1q8-puem","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"http://ghostscript.com/pipermail/gs-cvs/2010-January/010333.html","reference_id":"","reference_type":"","scores":[],"url":"http://ghostscript.com/pipermail/gs-cvs/2010-January/010333.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-0096.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-0096.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4054.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4054.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4054","reference_id":"","reference_type":"","scores":[{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64808","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64899","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64913","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.6493","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64859","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64886","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83123","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83119","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4054"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4054","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4054"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-17.xml"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2012-0095.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2012-0095.html"},{"reference_url":"http://www.kb.cert.org/vuls/id/538191","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/538191"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=646086","reference_id":"646086","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=646086"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4054","reference_id":"CVE-2010-4054","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4054"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0095","reference_id":"RHSA-2012:0095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0096","reference_id":"RHSA-2012:0096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0096"},{"reference_url":"https://usn.ubuntu.com/1317-1/","reference_id":"USN-1317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1317-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923048?format=json","purl":"pkg:deb/debian/ghostscript@8.71~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.71~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2010-4054"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jzm6-e1q8-puem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56850?format=json","vulnerability_id":"VCID-k2rj-x3d7-ryd2","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46955.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46955.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46955","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14697","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14678","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46955"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46955","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46955"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325042","reference_id":"2325042","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325042"},{"reference_url":"https://security.gentoo.org/glsa/202501-06","reference_id":"GLSA-202501-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-06"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=85bd9d2f4b792fe67aef22f1a4117457461b8ba6","reference_id":"?id=85bd9d2f4b792fe67aef22f1a4117457461b8ba6","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=85bd9d2f4b792fe67aef22f1a4117457461b8ba6"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707990","reference_id":"show_bug.cgi?id=707990","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707990"},{"reference_url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/","reference_id":"suse-su-20243942-1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T19:58:59Z/"}],"url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243942-1/"},{"reference_url":"https://usn.ubuntu.com/7103-1/","reference_id":"USN-7103-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7103-1/"},{"reference_url":"https://usn.ubuntu.com/7138-1/","reference_id":"USN-7138-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7138-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923098?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923097?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923099?format=json","purl":"pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-46955"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k2rj-x3d7-ryd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32119?format=json","vulnerability_id":"VCID-kbfn-852g-fker","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which can resulting in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6196.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6196","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57417","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57501","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5755","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5757","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57549","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57527","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6196"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1427440","reference_id":"1427440","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1427440"},{"reference_url":"https://security.gentoo.org/glsa/201708-06","reference_id":"GLSA-201708-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201708-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-6196"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbfn-852g-fker"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58224?format=json","vulnerability_id":"VCID-kck6-wj6h-3ybr","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46646.json","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46646.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-46646","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2509","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24903","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2499","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25128","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-46646"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2362446","reference_id":"2362446","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2362446"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f14ea81e6c3d2f51593f23cdf13c4679a18f1a3f","reference_id":"?id=f14ea81e6c3d2f51593f23cdf13c4679a18f1a3f","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-29T13:44:40Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f14ea81e6c3d2f51593f23cdf13c4679a18f1a3f"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708311","reference_id":"show_bug.cgi?id=708311","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-29T13:44:40Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708311"},{"reference_url":"https://usn.ubuntu.com/7473-1/","reference_id":"USN-7473-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7473-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923102?format=json","purl":"pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-46646"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kck6-wj6h-3ybr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60670?format=json","vulnerability_id":"VCID-kd8x-74zr-e7dd","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16303.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16303.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16303","reference_id":"","reference_type":"","scores":[{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.8638","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86408","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86409","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86428","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86438","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86452","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86451","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02945","scoring_system":"epss","scoring_elements":"0.86445","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870258","reference_id":"1870258","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870258"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16303"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kd8x-74zr-e7dd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60672?format=json","vulnerability_id":"VCID-kjpt-6dws-9ufd","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16305.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16305.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16305","reference_id":"","reference_type":"","scores":[{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64669","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64722","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.6475","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64771","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64749","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870257","reference_id":"1870257","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870257"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16305"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kjpt-6dws-9ufd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79393?format=json","vulnerability_id":"VCID-kk8v-381v-sybr","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3839.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3839.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3839","reference_id":"","reference_type":"","scores":[{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41581","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41668","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41696","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41623","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41682","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41705","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41657","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3839"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1673304","reference_id":"1673304","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1673304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0971","reference_id":"RHSA-2019:0971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1017","reference_id":"RHSA-2019:1017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1017"},{"reference_url":"https://usn.ubuntu.com/3970-1/","reference_id":"USN-3970-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3970-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923070?format=json","purl":"pkg:deb/debian/ghostscript@9.27~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.27~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-3839"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kk8v-381v-sybr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88273?format=json","vulnerability_id":"VCID-knsr-5uns-z7b1","summary":"ghostscript: Buffer overflow in BaseFont writer module for pdfwrite device","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-6679.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-6679.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-6679","reference_id":"","reference_type":"","scores":[{"value":"0.06059","scoring_system":"epss","scoring_elements":"0.90698","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06059","scoring_system":"epss","scoring_elements":"0.90704","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06059","scoring_system":"epss","scoring_elements":"0.90714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06059","scoring_system":"epss","scoring_elements":"0.90724","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06059","scoring_system":"epss","scoring_elements":"0.90735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06059","scoring_system":"epss","scoring_elements":"0.90741","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06059","scoring_system":"epss","scoring_elements":"0.9075","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06059","scoring_system":"epss","scoring_elements":"0.90749","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06059","scoring_system":"epss","scoring_elements":"0.90746","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-6679"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6679","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6679"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=493445","reference_id":"493445","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=493445"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524803","reference_id":"524803","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524803"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0421","reference_id":"RHSA-2009:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0421"},{"reference_url":"https://usn.ubuntu.com/757-1/","reference_id":"USN-757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/757-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923045?format=json","purl":"pkg:deb/debian/ghostscript@8.64~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2008-6679"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-knsr-5uns-z7b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34548?format=json","vulnerability_id":"VCID-ktug-1ryc-wbea","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7979.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7979.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7979","reference_id":"","reference_type":"","scores":[{"value":"0.02635","scoring_system":"epss","scoring_elements":"0.85619","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02635","scoring_system":"epss","scoring_elements":"0.85631","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02635","scoring_system":"epss","scoring_elements":"0.85648","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02635","scoring_system":"epss","scoring_elements":"0.85656","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02635","scoring_system":"epss","scoring_elements":"0.85675","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02635","scoring_system":"epss","scoring_elements":"0.85686","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02635","scoring_system":"epss","scoring_elements":"0.85701","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02635","scoring_system":"epss","scoring_elements":"0.85697","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02635","scoring_system":"epss","scoring_elements":"0.85693","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1382305","reference_id":"1382305","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1382305"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839846","reference_id":"839846","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839846"},{"reference_url":"https://security.gentoo.org/glsa/201702-31","reference_id":"GLSA-201702-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0013","reference_id":"RHSA-2017:0013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0014","reference_id":"RHSA-2017:0014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0014"},{"reference_url":"https://usn.ubuntu.com/3148-1/","reference_id":"USN-3148-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3148-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923056?format=json","purl":"pkg:deb/debian/ghostscript@9.19~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.19~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2016-7979"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ktug-1ryc-wbea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60653?format=json","vulnerability_id":"VCID-kw3r-f2mb-cyf6","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15900.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15900.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15900","reference_id":"","reference_type":"","scores":[{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93401","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93409","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93428","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93434","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11034","scoring_system":"epss","scoring_elements":"0.93435","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15900"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1859492","reference_id":"1859492","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1859492"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://usn.ubuntu.com/4445-1/","reference_id":"USN-4445-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4445-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923072?format=json","purl":"pkg:deb/debian/ghostscript@9.52.1~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.52.1~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-15900"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kw3r-f2mb-cyf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76081?format=json","vulnerability_id":"VCID-mb3e-psz1-tugh","summary":"security update","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=0a7e5a1c309fa0911b892fa40996a7d55d90bace","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=0a7e5a1c309fa0911b892fa40996a7d55d90bace"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19478.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19478","reference_id":"","reference_type":"","scores":[{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70561","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.7063","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70653","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70575","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70591","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70615","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19478"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=699856","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=699856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00019.html"},{"reference_url":"https://www.ghostscript.com/doc/9.26/History9.htm","reference_id":"","reference_type":"","scores":[],"url":"https://www.ghostscript.com/doc/9.26/History9.htm"},{"reference_url":"http://www.securityfocus.com/bid/106445","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106445"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1655607","reference_id":"1655607","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1655607"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-19478","reference_id":"CVE-2018-19478","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-19478"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923066?format=json","purl":"pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-19478"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mb3e-psz1-tugh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36089?format=json","vulnerability_id":"VCID-mg71-sbsj-2yam","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3781.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3781","reference_id":"","reference_type":"","scores":[{"value":"0.06952","scoring_system":"epss","scoring_elements":"0.91437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.91454","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.91463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.9147","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.91448","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.91483","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.91489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07045","scoring_system":"epss","scoring_elements":"0.91495","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07893","scoring_system":"epss","scoring_elements":"0.92024","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3781"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2002271","reference_id":"2002271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2002271"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994011","reference_id":"994011","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994011"},{"reference_url":"https://security.archlinux.org/ASA-202109-3","reference_id":"ASA-202109-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202109-3"},{"reference_url":"https://security.archlinux.org/AVG-2374","reference_id":"AVG-2374","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2374"},{"reference_url":"https://security.gentoo.org/glsa/202211-11","reference_id":"GLSA-202211-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-11"},{"reference_url":"https://usn.ubuntu.com/5075-1/","reference_id":"USN-5075-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5075-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923076?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923075?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2021-3781"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mg71-sbsj-2yam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80308?format=json","vulnerability_id":"VCID-mjce-bddh-bbgc","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5653.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5653.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5653","reference_id":"","reference_type":"","scores":[{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48594","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48636","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48657","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.4861","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48664","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48661","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48678","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48665","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1380327","reference_id":"1380327","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1380327"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839118","reference_id":"839118","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839118"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0013","reference_id":"RHSA-2017:0013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0014","reference_id":"RHSA-2017:0014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0014"},{"reference_url":"https://usn.ubuntu.com/3148-1/","reference_id":"USN-3148-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3148-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923056?format=json","purl":"pkg:deb/debian/ghostscript@9.19~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.19~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2013-5653"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mjce-bddh-bbgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51911?format=json","vulnerability_id":"VCID-mp48-78e1-xqdy","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=39b1e54b2968620723bf32e96764c88797714879","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=39b1e54b2968620723bf32e96764c88797714879"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10194.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10194.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10194","reference_id":"","reference_type":"","scores":[{"value":"0.00648","scoring_system":"epss","scoring_elements":"0.70713","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00648","scoring_system":"epss","scoring_elements":"0.70775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00648","scoring_system":"epss","scoring_elements":"0.70783","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00648","scoring_system":"epss","scoring_elements":"0.70806","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00648","scoring_system":"epss","scoring_elements":"0.7079","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00648","scoring_system":"epss","scoring_elements":"0.70728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00648","scoring_system":"epss","scoring_elements":"0.70746","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00648","scoring_system":"epss","scoring_elements":"0.70722","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00648","scoring_system":"epss","scoring_elements":"0.70767","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10194"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=699255","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=699255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10194"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00028.html"},{"reference_url":"http://www.securitytracker.com/id/1040729","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040729"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1569108","reference_id":"1569108","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1569108"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896069","reference_id":"896069","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896069"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10194","reference_id":"CVE-2018-10194","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10194"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2918","reference_id":"RHSA-2018:2918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2918"},{"reference_url":"https://usn.ubuntu.com/3636-1/","reference_id":"USN-3636-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3636-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923059?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-10194"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mp48-78e1-xqdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60655?format=json","vulnerability_id":"VCID-mqgf-gbdy-4uav","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16288.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16288.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16288","reference_id":"","reference_type":"","scores":[{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77947","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870266","reference_id":"1870266","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870266"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16288"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mqgf-gbdy-4uav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43786?format=json","vulnerability_id":"VCID-mr6f-95kb-wfhf","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could result in remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28879.json","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28879.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28879","reference_id":"","reference_type":"","scores":[{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96742","published_at":"2026-04-02T12:55:00Z"},{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96743","published_at":"2026-04-04T12:55:00Z"},{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96747","published_at":"2026-04-07T12:55:00Z"},{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96754","published_at":"2026-04-08T12:55:00Z"},{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96755","published_at":"2026-04-09T12:55:00Z"},{"value":"0.31221","scoring_system":"epss","scoring_elements":"0.96758","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28879"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033757","reference_id":"1033757","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184585","reference_id":"2184585","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184585"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/04/12/4","reference_id":"4","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/04/12/4"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/","reference_id":"CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI6UCKM3XMK7PYNIRGAVDJ5VKN6XYZOE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/","reference_id":"DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHJX62KSRIOBZA6FKONMJP7MEFY7LTH2/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5383","reference_id":"dsa-5383","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://www.debian.org/security/2023/dsa-5383"},{"reference_url":"https://security.gentoo.org/glsa/202309-03","reference_id":"GLSA-202309-03","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://security.gentoo.org/glsa/202309-03"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/","reference_id":"MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MADLP3GWJFLLFVNZGEDNPMDQR6CCXAHN/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00003.html"},{"reference_url":"https://ghostscript.readthedocs.io/en/latest/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://ghostscript.readthedocs.io/en/latest/News.html"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179","reference_id":"?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=37ed5022cecd584de868933b5b60da2e995b3179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6544","reference_id":"RHSA-2023:6544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7053","reference_id":"RHSA-2023:7053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7053"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=706494","reference_id":"show_bug.cgi?id=706494","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-02-14T19:29:27Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=706494"},{"reference_url":"https://usn.ubuntu.com/6017-1/","reference_id":"USN-6017-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6017-1/"},{"reference_url":"https://usn.ubuntu.com/6017-2/","reference_id":"USN-6017-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6017-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923083?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923082?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2023-28879"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mr6f-95kb-wfhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51904?format=json","vulnerability_id":"VCID-msc6-ev6c-1bcn","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9726.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9726.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9726","reference_id":"","reference_type":"","scores":[{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56072","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56239","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56225","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56233","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475830","reference_id":"1475830","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475830"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869915","reference_id":"869915","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869915"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9726"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-msc6-ev6c-1bcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32118?format=json","vulnerability_id":"VCID-n1r4-f9xj-xbd4","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which can resulting in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5951.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5951.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5951","reference_id":"","reference_type":"","scores":[{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74448","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74496","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74485","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74501","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74452","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74479","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00828","scoring_system":"epss","scoring_elements":"0.74453","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5951"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=697548","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=697548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2017/dsa-3838","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3838"},{"reference_url":"http://www.securityfocus.com/bid/98665","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98665"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441572","reference_id":"1441572","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441572"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859696","reference_id":"859696","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859696"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5951","reference_id":"CVE-2017-5951","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5951"},{"reference_url":"https://security.gentoo.org/glsa/201708-06","reference_id":"GLSA-201708-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201708-06"},{"reference_url":"https://usn.ubuntu.com/3272-1/","reference_id":"USN-3272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3272-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923058?format=json","purl":"pkg:deb/debian/ghostscript@9.20~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.20~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-5951"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n1r4-f9xj-xbd4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47323?format=json","vulnerability_id":"VCID-n21h-5ck9-43ck","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2012-10/msg00015.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1256.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1256.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4405.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4405.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4405","reference_id":"","reference_type":"","scores":[{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97045","published_at":"2026-04-13T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97019","published_at":"2026-04-01T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97027","published_at":"2026-04-02T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.9703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.9704","published_at":"2026-04-08T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97041","published_at":"2026-04-09T12:55:00Z"},{"value":"0.3537","scoring_system":"epss","scoring_elements":"0.97044","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405"},{"reference_url":"http://secunia.com/advisories/50719","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50719"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-17.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78411","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78411"},{"reference_url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0301","reference_id":"","reference_type":"","scores":[],"url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0301"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:151","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:151"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:089","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:089"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:090","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:090"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/09/11/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/09/11/2"},{"reference_url":"http://www.securityfocus.com/bid/55494","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55494"},{"reference_url":"http://www.securitytracker.com/id?1027517","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1027517"},{"reference_url":"http://www.ubuntu.com/usn/USN-1581-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1581-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687274","reference_id":"687274","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687274"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687275","reference_id":"687275","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687275"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=854227","reference_id":"854227","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=854227"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:cms:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:argyllcms:cms:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:cms:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:color:icclib:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:color:icclib:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:color:icclib:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:9.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:9.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:9.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4405","reference_id":"CVE-2012-4405","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4405"},{"reference_url":"https://security.gentoo.org/glsa/201402-29","reference_id":"GLSA-201402-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-29"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1256","reference_id":"RHSA-2012:1256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1256"},{"reference_url":"https://usn.ubuntu.com/1581-1/","reference_id":"USN-1581-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1581-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923054?format=json","purl":"pkg:deb/debian/ghostscript@9.05~dfsg-6.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.05~dfsg-6.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2012-4405"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n21h-5ck9-43ck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60661?format=json","vulnerability_id":"VCID-n8rh-znkz-tfdt","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16294.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16294.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16294","reference_id":"","reference_type":"","scores":[{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72951","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72983","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.7301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73034","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73013","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73007","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870229","reference_id":"1870229","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870229"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16294"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n8rh-znkz-tfdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60658?format=json","vulnerability_id":"VCID-nhtp-m11f-xuh6","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16291.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16291.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16291","reference_id":"","reference_type":"","scores":[{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62636","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62659","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79263","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79273","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.7928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79305","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79232","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870240","reference_id":"1870240","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870240"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16291"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nhtp-m11f-xuh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51898?format=json","vulnerability_id":"VCID-njhw-89wt-23b1","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9612.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9612.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9612","reference_id":"","reference_type":"","scores":[{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53407","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53426","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53524","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53507","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53431","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53478","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475826","reference_id":"1475826","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475826"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869916","reference_id":"869916","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869916"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9612"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-njhw-89wt-23b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81876?format=json","vulnerability_id":"VCID-nsan-3rne-7fbw","summary":"ghostscript: heap buffer over write vulnerability in GhostScript's lp8000_print_page() in gdevlp8k.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27792.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27792.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27792","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13853","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13911","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1376","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16985","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1694","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16863","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1701","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27792"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2247179","reference_id":"2247179","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2247179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://usn.ubuntu.com/5618-1/","reference_id":"USN-5618-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5618-1/"},{"reference_url":"https://usn.ubuntu.com/5643-1/","reference_id":"USN-5643-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5643-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-27792"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nsan-3rne-7fbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51906?format=json","vulnerability_id":"VCID-p4e6-xwff-vuax","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9739.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9739.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9739","reference_id":"","reference_type":"","scores":[{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56072","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56239","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56225","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56233","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475834","reference_id":"1475834","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475834"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869910","reference_id":"869910","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869910"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9739"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p4e6-xwff-vuax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76076?format=json","vulnerability_id":"VCID-p54p-uq6s-17g4","summary":"security update","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=693baf02152119af6e6afd30bb8ec76d14f84bbf","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=693baf02152119af6e6afd30bb8ec76d14f84bbf"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19134.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19134.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19134","reference_id":"","reference_type":"","scores":[{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79793","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79794","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79816","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.798","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79758","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79787","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19134"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=700141","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=700141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00019.html"},{"reference_url":"https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf","reference_id":"","reference_type":"","scores":[],"url":"https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf"},{"reference_url":"https://www.ghostscript.com/doc/9.26/News.htm","reference_id":"","reference_type":"","scores":[],"url":"https://www.ghostscript.com/doc/9.26/News.htm"},{"reference_url":"http://www.securityfocus.com/bid/106278","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106278"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1655599","reference_id":"1655599","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1655599"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-19134","reference_id":"CVE-2018-19134","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-19134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3834","reference_id":"RHSA-2018:3834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3834"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923066?format=json","purl":"pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-19134"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p54p-uq6s-17g4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56849?format=json","vulnerability_id":"VCID-p7nb-9g3f-2bf3","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46954.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46954","reference_id":"","reference_type":"","scores":[{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32258","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32422","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32296","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32326","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32288","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46954"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325044","reference_id":"2325044","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325044"},{"reference_url":"https://security.gentoo.org/glsa/202501-06","reference_id":"GLSA-202501-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-06"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=55f587dd039282316f512e1bea64218fd991f934","reference_id":"?id=55f587dd039282316f512e1bea64218fd991f934","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:24:52Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=55f587dd039282316f512e1bea64218fd991f934"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:24:52Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7422","reference_id":"RHSA-2025:7422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7499","reference_id":"RHSA-2025:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7499"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707788","reference_id":"show_bug.cgi?id=707788","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:24:52Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707788"},{"reference_url":"https://usn.ubuntu.com/7103-1/","reference_id":"USN-7103-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7103-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923099?format=json","purl":"pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-46954"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p7nb-9g3f-2bf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51917?format=json","vulnerability_id":"VCID-p9qf-vrde-ruhj","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16509.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16509.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16509","reference_id":"","reference_type":"","scores":[{"value":"0.91758","scoring_system":"epss","scoring_elements":"0.99681","published_at":"2026-04-01T12:55:00Z"},{"value":"0.91758","scoring_system":"epss","scoring_elements":"0.99682","published_at":"2026-04-02T12:55:00Z"},{"value":"0.91758","scoring_system":"epss","scoring_elements":"0.99683","published_at":"2026-04-04T12:55:00Z"},{"value":"0.91758","scoring_system":"epss","scoring_elements":"0.99684","published_at":"2026-04-07T12:55:00Z"},{"value":"0.91758","scoring_system":"epss","scoring_elements":"0.99685","published_at":"2026-04-09T12:55:00Z"},{"value":"0.91758","scoring_system":"epss","scoring_elements":"0.99686","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1619748","reference_id":"1619748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1619748"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332","reference_id":"907332","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45369.rb","reference_id":"CVE-2018-16509","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45369.rb"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/7f20178a0572176d2d57118e1e5cc3ef9c434656/modules/exploits/multi/fileformat/ghostscript_failed_restore.rb","reference_id":"CVE-2018-16509","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/7f20178a0572176d2d57118e1e5cc3ef9c434656/modules/exploits/multi/fileformat/ghostscript_failed_restore.rb"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2918","reference_id":"RHSA-2018:2918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3760","reference_id":"RHSA-2018:3760","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3760"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923061?format=json","purl":"pkg:deb/debian/ghostscript@9.25~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.25~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-16509"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p9qf-vrde-ruhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61675?format=json","vulnerability_id":"VCID-pjph-6muk-aff3","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33871.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33871","reference_id":"","reference_type":"","scores":[{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72059","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72023","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72019","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72068","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72091","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00703","scoring_system":"epss","scoring_elements":"0.72075","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/06/28/2","reference_id":"2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-05T14:13:10Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/06/28/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283508","reference_id":"2283508","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2283508"},{"reference_url":"https://security.gentoo.org/glsa/202409-03","reference_id":"GLSA-202409-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-03"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=7145885041bb52cc23964f0aa2aec1b1c82b5908","reference_id":"?id=7145885041bb52cc23964f0aa2aec1b1c82b5908","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-05T14:13:10Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=7145885041bb52cc23964f0aa2aec1b1c82b5908"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3999","reference_id":"RHSA-2024:3999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4000","reference_id":"RHSA-2024:4000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4014","reference_id":"RHSA-2024:4014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4014"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4462","reference_id":"RHSA-2024:4462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4527","reference_id":"RHSA-2024:4527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4537","reference_id":"RHSA-2024:4537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4541","reference_id":"RHSA-2024:4541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4544","reference_id":"RHSA-2024:4544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4549","reference_id":"RHSA-2024:4549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4549"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707754","reference_id":"show_bug.cgi?id=707754","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-05T14:13:10Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707754"},{"reference_url":"https://usn.ubuntu.com/6835-1/","reference_id":"USN-6835-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6835-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923092?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923096?format=json","purl":"pkg:deb/debian/ghostscript@10.03.1~dfsg~git20240518-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.1~dfsg~git20240518-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-33871"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pjph-6muk-aff3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96936?format=json","vulnerability_id":"VCID-pnwf-fw4h-r3g3","summary":"A vulnerability was found in Artifex GhostPDL up to 3989415a5b8e99b9d1b87cc9902bde9b7cdea145. It has been classified as problematic. This affects the function pdf_ferror of the file devices/vector/gdevpdf.c of the component New Output File Open Error Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The identifier of the patch is 619a106ba4c4abed95110f84d5efcd7aee38c7cb. It is recommended to apply a patch to fix this issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-7462","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22641","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24291","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24329","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24373","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2439","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24348","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-7462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7462"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109270","reference_id":"1109270","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109270"},{"reference_url":"https://artifex.com/","reference_id":"artifex.com","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/"}],"url":"https://artifex.com/"},{"reference_url":"https://vuldb.com/?ctiid.316113","reference_id":"?ctiid.316113","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/"}],"url":"https://vuldb.com/?ctiid.316113"},{"reference_url":"https://vuldb.com/?id.316113","reference_id":"?id.316113","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/"}],"url":"https://vuldb.com/?id.316113"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4","reference_id":"?id=619a106ba4c4","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=619a106ba4c4"},{"reference_url":"https://vuldb.com/?submit.610173","reference_id":"?submit.610173","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:ND/RL:OF/RC:C"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C"},{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-14T19:13:25Z/"}],"url":"https://vuldb.com/?submit.610173"},{"reference_url":"https://usn.ubuntu.com/7782-1/","reference_id":"USN-7782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7782-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923104?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923106?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-7462"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pnwf-fw4h-r3g3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87801?format=json","vulnerability_id":"VCID-pprr-k86j-d7c5","summary":"ghostscript: PS parser buffer overflow in token scanner","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1869.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1869.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1869","reference_id":"","reference_type":"","scores":[{"value":"0.21202","scoring_system":"epss","scoring_elements":"0.95667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21202","scoring_system":"epss","scoring_elements":"0.95631","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21202","scoring_system":"epss","scoring_elements":"0.9564","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21202","scoring_system":"epss","scoring_elements":"0.95646","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21202","scoring_system":"epss","scoring_elements":"0.95648","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21202","scoring_system":"epss","scoring_elements":"0.95656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21202","scoring_system":"epss","scoring_elements":"0.9566","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21202","scoring_system":"epss","scoring_elements":"0.95665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.21202","scoring_system":"epss","scoring_elements":"0.95664","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1869"},{"reference_url":"http://secunia.com/advisories/39753","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39753"},{"reference_url":"http://secunia.com/advisories/40580","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40580"},{"reference_url":"http://www.checkpoint.com/defense/advisories/public/2010/cpai-10-May.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.checkpoint.com/defense/advisories/public/2010/cpai-10-May.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:102","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:102"},{"reference_url":"http://www.securityfocus.com/archive/1/511243/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/511243/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/40103","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/40103"},{"reference_url":"http://www.securitytracker.com/id?1024003","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1024003"},{"reference_url":"http://www.ubuntu.com/usn/USN-961-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-961-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1138","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1138"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1195","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1195"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=582300","reference_id":"582300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=582300"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/local/14406.pl","reference_id":"CVE-2010-1869","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/local/14406.pl"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1869","reference_id":"CVE-2010-1869","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1869"},{"reference_url":"https://usn.ubuntu.com/961-1/","reference_id":"USN-961-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/961-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923052?format=json","purl":"pkg:deb/debian/ghostscript@8.71~dfsg-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.71~dfsg-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2010-1869"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pprr-k86j-d7c5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34549?format=json","vulnerability_id":"VCID-ppup-7vp4-v7f1","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=f5c7555c303","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=f5c7555c303"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0013.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2017-0013.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2017-0014.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8602.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8602","reference_id":"","reference_type":"","scores":[{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.7915","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79201","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.792","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79224","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79157","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79182","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79167","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79192","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8602"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=697203","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=697203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://ghostscript.com/doc/9.21/History9.htm","reference_id":"","reference_type":"","scores":[],"url":"https://ghostscript.com/doc/9.21/History9.htm"},{"reference_url":"http://www.debian.org/security/2016/dsa-3691","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3691"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/10/11/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/10/11/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/10/11/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/10/11/7"},{"reference_url":"http://www.securityfocus.com/bid/95311","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/95311"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1383940","reference_id":"1383940","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1383940"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840451","reference_id":"840451","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840451"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8602","reference_id":"CVE-2016-8602","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8602"},{"reference_url":"https://security.gentoo.org/glsa/201702-31","reference_id":"GLSA-201702-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0013","reference_id":"RHSA-2017:0013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0014","reference_id":"RHSA-2017:0014","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0014"},{"reference_url":"https://usn.ubuntu.com/3148-1/","reference_id":"USN-3148-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3148-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923056?format=json","purl":"pkg:deb/debian/ghostscript@9.19~dfsg-3.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.19~dfsg-3.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2016-8602"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ppup-7vp4-v7f1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67456?format=json","vulnerability_id":"VCID-pvfx-6ymq-6qbf","summary":"Artifex Ghostscript: From CVEorg collector","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59799.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59799","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03631","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03654","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03622","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-59799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116443","reference_id":"1116443","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116443"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397227","reference_id":"2397227","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397227"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=6dab38fb211f15226c242ab7a83fa53e4b0ff781","reference_id":"?id=6dab38fb211f15226c242ab7a83fa53e4b0ff781","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:48:50Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=6dab38fb211f15226c242ab7a83fa53e4b0ff781"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708517","reference_id":"show_bug.cgi?id=708517","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-23T13:48:50Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708517"},{"reference_url":"https://usn.ubuntu.com/7782-1/","reference_id":"USN-7782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7782-1/"},{"reference_url":"https://usn.ubuntu.com/7904-1/","reference_id":"USN-7904-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7904-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923104?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923105?format=json","purl":"pkg:deb/debian/ghostscript@10.06.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.06.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-59799"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pvfx-6ymq-6qbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58219?format=json","vulnerability_id":"VCID-pwas-b3sw-guav","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27833.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27833.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27833","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09356","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09412","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0944","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09453","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09426","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09407","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09318","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09392","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354954","reference_id":"2354954","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354954"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708259","reference_id":"show_bug.cgi?id=708259","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:36:49Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708259"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923100?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923102?format=json","purl":"pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-27833"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pwas-b3sw-guav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47321?format=json","vulnerability_id":"VCID-px5c-mg2t-8uhg","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583183","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583183"},{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583316","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583316"},{"reference_url":"http://bugs.ghostscript.com/show_bug.cgi?id=691339","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.ghostscript.com/show_bug.cgi?id=691339"},{"reference_url":"http://bugs.ghostscript.com/show_bug.cgi?id=691350","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.ghostscript.com/show_bug.cgi?id=691350"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2055.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2055.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2055","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20016","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20032","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20178","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20237","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19962","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20042","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20119","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20074","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2055"},{"reference_url":"http://savannah.gnu.org/forum/forum.php?forum_id=6368","reference_id":"","reference_type":"","scores":[],"url":"http://savannah.gnu.org/forum/forum.php?forum_id=6368"},{"reference_url":"https://bugzilla.novell.com/show_bug.cgi?id=608071","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.novell.com/show_bug.cgi?id=608071"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2055"},{"reference_url":"http://secunia.com/advisories/40452","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40452"},{"reference_url":"http://secunia.com/advisories/40475","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40475"},{"reference_url":"http://secunia.com/advisories/40532","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40532"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-17.xml"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2012-0095.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2012-0095.html"},{"reference_url":"http://www.osvdb.org/66247","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/66247"},{"reference_url":"http://www.securityfocus.com/archive/1/511433","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/511433"},{"reference_url":"http://www.securityfocus.com/archive/1/511472","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/511472"},{"reference_url":"http://www.securityfocus.com/archive/1/511474","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/511474"},{"reference_url":"http://www.securityfocus.com/archive/1/511476","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/511476"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1757","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1757"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584653","reference_id":"584653","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584653"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=599564","reference_id":"599564","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=599564"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2055","reference_id":"CVE-2010-2055","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2055"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0095","reference_id":"RHSA-2012:0095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0095"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923053?format=json","purl":"pkg:deb/debian/ghostscript@8.71~dfsg2-6.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.71~dfsg2-6.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2010-2055"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-px5c-mg2t-8uhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61672?format=json","vulnerability_id":"VCID-q9by-9s2x-z3au","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29510.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29510.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29510","reference_id":"","reference_type":"","scores":[{"value":"0.06906","scoring_system":"epss","scoring_elements":"0.91351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.9222","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.92199","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.92202","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.92214","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.92217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.92222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08233","scoring_system":"epss","scoring_elements":"0.92223","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293950","reference_id":"2293950","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2293950"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/07/03/7","reference_id":"7","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T13:49:45Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/07/03/7"},{"reference_url":"https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/","reference_id":"cve-2024-29510-ghostscript-format-string-exploitation","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T13:49:45Z/"}],"url":"https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/"},{"reference_url":"https://security.gentoo.org/glsa/202409-03","reference_id":"GLSA-202409-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6197","reference_id":"RHSA-2024:6197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6466","reference_id":"RHSA-2024:6466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6466"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707662","reference_id":"show_bug.cgi?id=707662","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T13:49:45Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707662"},{"reference_url":"https://usn.ubuntu.com/6835-1/","reference_id":"USN-6835-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6835-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923092?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923096?format=json","purl":"pkg:deb/debian/ghostscript@10.03.1~dfsg~git20240518-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.1~dfsg~git20240518-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-29510"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q9by-9s2x-z3au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3716?format=json","vulnerability_id":"VCID-qtav-hqnd-b7fa","summary":"A buffer over-read flaw was found in the bundled expat library. An attacker who is able to get Apache to parse an untrused XML document (for example through mod_dav) may be able to cause a crash. This crash would only be a denial of service if using the worker MPM.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3560.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3560.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3560","reference_id":"","reference_type":"","scores":[{"value":"0.0283","scoring_system":"epss","scoring_elements":"0.86182","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0283","scoring_system":"epss","scoring_elements":"0.86111","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0283","scoring_system":"epss","scoring_elements":"0.86121","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0283","scoring_system":"epss","scoring_elements":"0.86137","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0283","scoring_system":"epss","scoring_elements":"0.86156","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0283","scoring_system":"epss","scoring_elements":"0.86168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03311","scoring_system":"epss","scoring_elements":"0.87253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03311","scoring_system":"epss","scoring_elements":"0.87257","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3560"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=533174","reference_id":"533174","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=533174"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560901","reference_id":"560901","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560901"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560919","reference_id":"560919","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560919"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560920","reference_id":"560920","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560920"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560921","reference_id":"560921","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560921"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560922","reference_id":"560922","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560922"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560926","reference_id":"560926","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560926"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560927","reference_id":"560927","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560927"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560928","reference_id":"560928","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560928"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560929","reference_id":"560929","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560929"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560930","reference_id":"560930","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560930"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560935","reference_id":"560935","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560935"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560936","reference_id":"560936","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560936"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560937","reference_id":"560937","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560937"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940","reference_id":"560940","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560942","reference_id":"560942","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560942"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601053","reference_id":"601053","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601053"},{"reference_url":"https://httpd.apache.org/security/json/CVE-2009-3560.json","reference_id":"CVE-2009-3560","reference_type":"","scores":[{"value":"low","scoring_system":"apache_httpd","scoring_elements":""}],"url":"https://httpd.apache.org/security/json/CVE-2009-3560.json"},{"reference_url":"https://security.gentoo.org/glsa/201209-06","reference_id":"GLSA-201209-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1625","reference_id":"RHSA-2009:1625","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1625"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3239","reference_id":"RHSA-2017:3239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3239"},{"reference_url":"https://usn.ubuntu.com/890-1/","reference_id":"USN-890-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-1/"},{"reference_url":"https://usn.ubuntu.com/890-2/","reference_id":"USN-890-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-2/"},{"reference_url":"https://usn.ubuntu.com/890-3/","reference_id":"USN-890-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-3/"},{"reference_url":"https://usn.ubuntu.com/890-4/","reference_id":"USN-890-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-4/"},{"reference_url":"https://usn.ubuntu.com/890-5/","reference_id":"USN-890-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-5/"},{"reference_url":"https://usn.ubuntu.com/890-6/","reference_id":"USN-890-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923047?format=json","purl":"pkg:deb/debian/ghostscript@8.71~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.71~dfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2009-3560"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qtav-hqnd-b7fa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60666?format=json","vulnerability_id":"VCID-qvq2-xbp6-m3fy","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16299.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16299.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16299","reference_id":"","reference_type":"","scores":[{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74477","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74499","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00826","scoring_system":"epss","scoring_elements":"0.74471","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870171","reference_id":"1870171","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870171"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16299"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qvq2-xbp6-m3fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76079?format=json","vulnerability_id":"VCID-rbpv-s7ks-37f9","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19476.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19476.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19476","reference_id":"","reference_type":"","scores":[{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74378","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74382","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74409","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74385","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74417","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74434","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00823","scoring_system":"epss","scoring_elements":"0.74427","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19478"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1654464","reference_id":"1654464","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1654464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0229","reference_id":"RHSA-2019:0229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0229"},{"reference_url":"https://usn.ubuntu.com/3831-1/","reference_id":"USN-3831-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3831-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923066?format=json","purl":"pkg:deb/debian/ghostscript@9.26~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.26~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-19476"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rbpv-s7ks-37f9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88751?format=json","vulnerability_id":"VCID-rfhb-3e3b-vbdz","summary":"jasper: crash in jpc_qcx_getcompparms","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413033","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413033"},{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413041","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413041"},{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413041%3Bmsg=88","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413041%3Bmsg=88"},{"reference_url":"http://osvdb.org/36137","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36137"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2721.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2721","reference_id":"","reference_type":"","scores":[{"value":"0.10147","scoring_system":"epss","scoring_elements":"0.93103","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10147","scoring_system":"epss","scoring_elements":"0.93075","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10147","scoring_system":"epss","scoring_elements":"0.93084","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10147","scoring_system":"epss","scoring_elements":"0.93088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10147","scoring_system":"epss","scoring_elements":"0.93087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10147","scoring_system":"epss","scoring_elements":"0.93095","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10147","scoring_system":"epss","scoring_elements":"0.93099","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10147","scoring_system":"epss","scoring_elements":"0.93104","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10147","scoring_system":"epss","scoring_elements":"0.93102","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2721"},{"reference_url":"http://secunia.com/advisories/25287","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25287"},{"reference_url":"http://secunia.com/advisories/25703","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25703"},{"reference_url":"http://secunia.com/advisories/26516","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26516"},{"reference_url":"http://secunia.com/advisories/27319","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27319"},{"reference_url":"http://secunia.com/advisories/27489","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27489"},{"reference_url":"http://secunia.com/advisories/39505","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39505"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9397","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9397"},{"reference_url":"http://www.debian.org/security/2010/dsa-2036","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2036"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:129","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:129"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:208","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:208"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:209","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:209"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:142","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:142"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:164"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0012.html"},{"reference_url":"http://www.securityfocus.com/bid/24052","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24052"},{"reference_url":"http://www.ubuntu.com/usn/usn-501-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-501-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-501-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-501-2"},{"reference_url":"http://www.vupen.com/english/advisories/2010/0912","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/0912"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=346501","reference_id":"346501","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=346501"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447188","reference_id":"447188","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447188"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_jpeg-2000:jasper_jpeg-2000:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:jasper_jpeg-2000:jasper_jpeg-2000:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_jpeg-2000:jasper_jpeg-2000:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2721","reference_id":"CVE-2007-2721","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0012","reference_id":"RHSA-2009:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0012"},{"reference_url":"https://usn.ubuntu.com/501-1/","reference_id":"USN-501-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/501-1/"},{"reference_url":"https://usn.ubuntu.com/501-2/","reference_id":"USN-501-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/501-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923038?format=json","purl":"pkg:deb/debian/ghostscript@8.61.dfsg.1~svn8187-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.61.dfsg.1~svn8187-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2007-2721"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rfhb-3e3b-vbdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60671?format=json","vulnerability_id":"VCID-s9t8-smvb-wkd4","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16304.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16304.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16304","reference_id":"","reference_type":"","scores":[{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56008","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56117","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56137","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56168","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56173","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00333","scoring_system":"epss","scoring_elements":"0.56184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64772","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870262","reference_id":"1870262","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870262"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16304"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s9t8-smvb-wkd4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84398?format=json","vulnerability_id":"VCID-sc3j-2vy3-j3e1","summary":"ghostscript: Out-of-bounds read in mark_line_tr function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8908.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8908.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8908","reference_id":"","reference_type":"","scores":[{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60027","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60152","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.6017","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60105","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60148","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60162","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8908"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1451247","reference_id":"1451247","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1451247"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-8908"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sc3j-2vy3-j3e1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60677?format=json","vulnerability_id":"VCID-sj4u-xzg3-z3hf","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16310.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16310.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16310","reference_id":"","reference_type":"","scores":[{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.8268","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82696","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82709","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82706","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82731","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82738","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82755","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82749","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01789","scoring_system":"epss","scoring_elements":"0.82746","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870159","reference_id":"1870159","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870159"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16310"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sj4u-xzg3-z3hf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60659?format=json","vulnerability_id":"VCID-snzm-pkb8-9fcp","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16292.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16292.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16292","reference_id":"","reference_type":"","scores":[{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77947","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870237","reference_id":"1870237","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870237"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16292"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-snzm-pkb8-9fcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51902?format=json","vulnerability_id":"VCID-szch-k4pu-wubc","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9619.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9619","reference_id":"","reference_type":"","scores":[{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70076","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70104","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70081","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70128","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70153","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.7014","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9619"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475828","reference_id":"1475828","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475828"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879","reference_id":"869879","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9619"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-szch-k4pu-wubc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84682?format=json","vulnerability_id":"VCID-tfdu-yxt7-87fw","summary":"ghostscript: NULL pointer dereference in the pfd14_pop_transparency_group function","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=d621292fb2c8157d9899dcd83fd04dd250e30fe4","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=d621292fb2c8157d9899dcd83fd04dd250e30fe4"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10218.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10218","reference_id":"","reference_type":"","scores":[{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60027","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60152","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60162","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.6017","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60105","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60148","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10218"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=697444","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=697444"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441568","reference_id":"1441568","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441568"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10218","reference_id":"CVE-2016-10218","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10218"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2016-10218"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tfdu-yxt7-87fw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60654?format=json","vulnerability_id":"VCID-thz5-yhwy-63fc","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16287.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16287.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16287","reference_id":"","reference_type":"","scores":[{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.8059","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870242","reference_id":"1870242","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870242"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16287"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-thz5-yhwy-63fc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60660?format=json","vulnerability_id":"VCID-tp6u-sxuv-a3a6","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16293.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16293.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16293","reference_id":"","reference_type":"","scores":[{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79749","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79757","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79778","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79793","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.798","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79822","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79806","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01311","scoring_system":"epss","scoring_elements":"0.79799","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870231","reference_id":"1870231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870231"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16293"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tp6u-sxuv-a3a6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48762?format=json","vulnerability_id":"VCID-tqtm-achn-z3fg","summary":"Multiple memory management errors in JasPer might lead to execution of\n    arbitrary code via jpeg2k files.","references":[{"reference_url":"http://bugs.gentoo.org/attachment.cgi?id=163282&action=view","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.gentoo.org/attachment.cgi?id=163282&action=view"},{"reference_url":"http://bugs.gentoo.org/show_bug.cgi?id=222819","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.gentoo.org/show_bug.cgi?id=222819"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0698.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3522.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3522.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3522","reference_id":"","reference_type":"","scores":[{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88808","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88813","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88753","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88777","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88796","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0425","scoring_system":"epss","scoring_elements":"0.88801","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522"},{"reference_url":"http://secunia.com/advisories/33173","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33173"},{"reference_url":"http://secunia.com/advisories/34391","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34391"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200812-18.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200812-18.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45623","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/45623"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:142","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:142"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:144","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:144"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:164","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:164"},{"reference_url":"http://www.securityfocus.com/bid/31470","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31470"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606"},{"reference_url":"http://www.ubuntu.com/usn/USN-742-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-742-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=461478","reference_id":"461478","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=461478"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778","reference_id":"559778","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778"},{"reference_url":"https://security.archlinux.org/AVG-99","reference_id":"AVG-99","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-99"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3522","reference_id":"CVE-2008-3522","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3522"},{"reference_url":"https://security.gentoo.org/glsa/200812-18","reference_id":"GLSA-200812-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200812-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0698","reference_id":"RHSA-2015:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0698"},{"reference_url":"https://usn.ubuntu.com/1317-1/","reference_id":"USN-1317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1317-1/"},{"reference_url":"https://usn.ubuntu.com/742-1/","reference_id":"USN-742-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/742-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923044?format=json","purl":"pkg:deb/debian/ghostscript@8.64~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2008-3522"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tqtm-achn-z3fg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78279?format=json","vulnerability_id":"VCID-trcm-319g-5qhu","summary":"ghostscript: Out-of-bound read in base/gdevdevn.c:1973 in devn_pcx_write_rle could result in DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38559.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38559.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38559","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01946","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01959","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01957","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01958","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01973","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.01937","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38559"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043033","reference_id":"1043033","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043033"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224367","reference_id":"2224367","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224367"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6544","reference_id":"RHSA-2023:6544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7053","reference_id":"RHSA-2023:7053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7053"},{"reference_url":"https://usn.ubuntu.com/6297-1/","reference_id":"USN-6297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6297-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923088?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923087?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923089?format=json","purl":"pkg:deb/debian/ghostscript@10.02.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.02.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2023-38559"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-trcm-319g-5qhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51895?format=json","vulnerability_id":"VCID-tug2-npfa-nkaj","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Bh=8210a2864372723b49c526e2b102fdc00c9c4699","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Bh=8210a2864372723b49c526e2b102fdc00c9c4699"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7948.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7948.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7948","reference_id":"","reference_type":"","scores":[{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.4525","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45342","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.4535","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45372","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.4534","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45331","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45352","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45295","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7948"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=697762","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=697762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7948"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1444944","reference_id":"1444944","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1444944"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7948","reference_id":"CVE-2017-7948","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7948"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-7948"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tug2-npfa-nkaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51918?format=json","vulnerability_id":"VCID-u9m8-3kch-ubft","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16510.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16510.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16510","reference_id":"","reference_type":"","scores":[{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44837","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.4492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.4494","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44882","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44934","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44935","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44926","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44928","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16510"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625836","reference_id":"1625836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625836"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908304","reference_id":"908304","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908304"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"},{"reference_url":"https://usn.ubuntu.com/3773-1/","reference_id":"USN-3773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3773-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923061?format=json","purl":"pkg:deb/debian/ghostscript@9.25~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.25~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-16510"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u9m8-3kch-ubft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79841?format=json","vulnerability_id":"VCID-ue85-9uqn-xye4","summary":"ghostscript: use-after-free in sampled_data_sample may lead to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45944.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45944.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45944","reference_id":"","reference_type":"","scores":[{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79078","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79085","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79112","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79097","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.79154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.7914","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01226","scoring_system":"epss","scoring_elements":"0.7913","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45944"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45944","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45944"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45949"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2048916","reference_id":"2048916","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2048916"},{"reference_url":"https://usn.ubuntu.com/5224-1/","reference_id":"USN-5224-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5224-1/"},{"reference_url":"https://usn.ubuntu.com/5224-2/","reference_id":"USN-5224-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5224-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923078?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923077?format=json","purl":"pkg:deb/debian/ghostscript@9.54.0~dfsg-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.54.0~dfsg-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2021-45944"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ue85-9uqn-xye4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60675?format=json","vulnerability_id":"VCID-uryu-n1p2-mugy","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16308.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16308.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16308","reference_id":"","reference_type":"","scores":[{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01091","scoring_system":"epss","scoring_elements":"0.77947","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870256","reference_id":"1870256","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870256"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16308"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uryu-n1p2-mugy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51922?format=json","vulnerability_id":"VCID-v38d-2sr1-7qcf","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16539.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16539.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16539","reference_id":"","reference_type":"","scores":[{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57499","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57583","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57604","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57579","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57633","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57637","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57651","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57611","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625839","reference_id":"1625839","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625839"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332","reference_id":"907332","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3650","reference_id":"RHSA-2018:3650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3650"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923064?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-16539"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v38d-2sr1-7qcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32120?format=json","vulnerability_id":"VCID-v6k1-wwq9-zfep","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which can resulting in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7207.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7207","reference_id":"","reference_type":"","scores":[{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67799","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.6787","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67897","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.6792","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67907","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67852","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67883","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7207"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=697676","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=697676"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2017/dsa-3838","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3838"},{"reference_url":"http://www.ghostscript.com/cgi-bin/findgit.cgi?309eca4e0a31ea70dcc844812691439312dad091","reference_id":"","reference_type":"","scores":[],"url":"http://www.ghostscript.com/cgi-bin/findgit.cgi?309eca4e0a31ea70dcc844812691439312dad091"},{"reference_url":"http://www.securityfocus.com/bid/96995","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/96995"},{"reference_url":"http://www.securitytracker.com/id/1039071","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1434353","reference_id":"1434353","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1434353"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858350","reference_id":"858350","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858350"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7207","reference_id":"CVE-2017-7207","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7207"},{"reference_url":"https://security.gentoo.org/glsa/201708-06","reference_id":"GLSA-201708-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201708-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2180","reference_id":"RHSA-2017:2180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2180"},{"reference_url":"https://usn.ubuntu.com/3272-1/","reference_id":"USN-3272-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3272-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923062?format=json","purl":"pkg:deb/debian/ghostscript@9.20~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.20~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-7207"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v6k1-wwq9-zfep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51920?format=json","vulnerability_id":"VCID-v7ug-73tf-e7fu","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16513.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16513","reference_id":"","reference_type":"","scores":[{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48773","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48812","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48837","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48792","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48846","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48859","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48833","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1619750","reference_id":"1619750","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1619750"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332","reference_id":"907332","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923064?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-16513"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v7ug-73tf-e7fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48786?format=json","vulnerability_id":"VCID-vkxy-8vep-x7bg","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=885444fcbe10dc42787ecb76686c8ee4dd33bf33","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=885444fcbe10dc42787ecb76686c8ee4dd33bf33"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html"},{"reference_url":"https://access.redhat.com/errata/RHBA-2019:2824","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:2824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2594","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2594"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14813.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14813.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14813","reference_id":"","reference_type":"","scores":[{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92315","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92355","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92328","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92332","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92343","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92353","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08454","scoring_system":"epss","scoring_elements":"0.92322","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14813"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/15","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/15"},{"reference_url":"https://www.debian.org/security/2019/dsa-4518","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4518"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743737","reference_id":"1743737","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1743737"},{"reference_url":"https://security.archlinux.org/ASA-201911-5","reference_id":"ASA-201911-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-5"},{"reference_url":"https://security.archlinux.org/AVG-1031","reference_id":"AVG-1031","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1031"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14813","reference_id":"CVE-2019-14813","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14813"},{"reference_url":"https://security.gentoo.org/glsa/202004-03","reference_id":"GLSA-202004-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2534","reference_id":"RHSA-2019:2534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2586","reference_id":"RHSA-2019:2586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2591","reference_id":"RHSA-2019:2591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2591"},{"reference_url":"https://usn.ubuntu.com/4111-1/","reference_id":"USN-4111-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4111-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923068?format=json","purl":"pkg:deb/debian/ghostscript@9.28~~rc2~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.28~~rc2~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2019-14813"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vkxy-8vep-x7bg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60668?format=json","vulnerability_id":"VCID-vw3z-bxb8-qkdq","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16301.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16301.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16301","reference_id":"","reference_type":"","scores":[{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74097","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74128","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.741","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74133","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74169","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74151","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74144","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870167","reference_id":"1870167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870167"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16301"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vw3z-bxb8-qkdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47320?format=json","vulnerability_id":"VCID-w2bj-tjet-3kbp","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"http://bugs.ghostscript.com/show_bug.cgi?id=691295","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.ghostscript.com/show_bug.cgi?id=691295"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1628.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1628","reference_id":"","reference_type":"","scores":[{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89853","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89811","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89814","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89828","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.8985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.89862","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0512","scoring_system":"epss","scoring_elements":"0.8986","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1628"},{"reference_url":"https://bugs.launchpad.net/ubuntu/+source/ghostscript/+bug/546009","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/+source/ghostscript/+bug/546009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1628"},{"reference_url":"http://seclists.org/fulldisclosure/2010/May/134","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2010/May/134"},{"reference_url":"http://secunia.com/advisories/39753","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39753"},{"reference_url":"http://secunia.com/advisories/40580","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40580"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-17.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:134","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:134"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/05/12/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/05/12/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/05/18/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/05/18/7"},{"reference_url":"http://www.securityfocus.com/archive/1/511243/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/511243/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/40107","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/40107"},{"reference_url":"http://www.ubuntu.com/usn/USN-961-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-961-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1138","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1138"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584516","reference_id":"584516","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584516"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=592492","reference_id":"592492","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=592492"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1628","reference_id":"CVE-2010-1628","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1628"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://usn.ubuntu.com/961-1/","reference_id":"USN-961-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/961-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923051?format=json","purl":"pkg:deb/debian/ghostscript@8.71~dfsg2-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.71~dfsg2-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2010-1628"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w2bj-tjet-3kbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47318?format=json","vulnerability_id":"VCID-w823-crw1-vub8","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4270.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4270.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4270","reference_id":"","reference_type":"","scores":[{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92404","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92411","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92419","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92423","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92439","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92445","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92448","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0864","scoring_system":"epss","scoring_elements":"0.92446","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4270"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=540760","reference_id":"540760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=540760"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562643","reference_id":"562643","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562643"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://usn.ubuntu.com/961-1/","reference_id":"USN-961-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/961-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923049?format=json","purl":"pkg:deb/debian/ghostscript@8.70~dfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.70~dfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2009-4270"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w823-crw1-vub8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73590?format=json","vulnerability_id":"VCID-wcdw-ygnz-f3aa","summary":"security update","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b60d50b7567369ad856cebe1efb6cd7dd2284219","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b60d50b7567369ad856cebe1efb6cd7dd2284219"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11645.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11645.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11645","reference_id":"","reference_type":"","scores":[{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67485","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67586","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67521","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67543","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67573","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11645"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=697193","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=697193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4336","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4336"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585914","reference_id":"1585914","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585914"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11645","reference_id":"CVE-2018-11645","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11645"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2281","reference_id":"RHSA-2019:2281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2281"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923063?format=json","purl":"pkg:deb/debian/ghostscript@9.21~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.21~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-11645"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wcdw-ygnz-f3aa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77917?format=json","vulnerability_id":"VCID-wj1v-tg7c-8ydn","summary":"ghostscript: dangling pointer in gdev_prn_open_printer_seekable()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46751.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46751.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46751","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29589","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2946","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29522","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29562","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29564","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29519","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29467","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46751"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253365","reference_id":"2253365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253365"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7422","reference_id":"RHSA-2025:7422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7422"},{"reference_url":"https://usn.ubuntu.com/6551-1/","reference_id":"USN-6551-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6551-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923090?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923091?format=json","purl":"pkg:deb/debian/ghostscript@10.02.1~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.02.1~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2023-46751"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wj1v-tg7c-8ydn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51924?format=json","vulnerability_id":"VCID-wpws-24gy-j7g8","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16541.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16541.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16541","reference_id":"","reference_type":"","scores":[{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63721","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63809","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63817","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63835","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63849","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63834","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63801","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625846","reference_id":"1625846","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625846"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332","reference_id":"907332","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3834","reference_id":"RHSA-2018:3834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3834"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923064?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-16541"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wpws-24gy-j7g8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51905?format=json","vulnerability_id":"VCID-wtcr-fwz7-j7bk","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9727.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9727.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9727","reference_id":"","reference_type":"","scores":[{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56072","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56239","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56225","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56233","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475833","reference_id":"1475833","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475833"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869913","reference_id":"869913","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869913"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9727"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wtcr-fwz7-j7bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75002?format=json","vulnerability_id":"VCID-wtv2-9jx7-kkgz","summary":"ghostscript: heap pointer leak in pdf_base_font_alloc()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29508.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29508","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10166","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10061","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10198","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10235","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10195","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29508"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295627","reference_id":"2295627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295627"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/07/03/7","reference_id":"7","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:49:12Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/07/03/7"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Bh=ff1013a0ab485b66783b70145e342a82c670906a","reference_id":"?p=ghostpdl.git%3Bh=ff1013a0ab485b66783b70145e342a82c670906a","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:49:12Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Bh=ff1013a0ab485b66783b70145e342a82c670906a"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510","reference_id":"show_bug.cgi?id=707510","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:49:12Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510"},{"reference_url":"https://usn.ubuntu.com/6897-1/","reference_id":"USN-6897-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6897-1/"},{"reference_url":"https://usn.ubuntu.com/7623-1/","reference_id":"USN-7623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7623-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923095?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923093?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923094?format=json","purl":"pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-29508"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wtv2-9jx7-kkgz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82964?format=json","vulnerability_id":"VCID-wy22-ngrc-dbf7","summary":"ghostscript: incomplete fix for CVE-2018-16509","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16863.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16863.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16863","reference_id":"","reference_type":"","scores":[{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24364","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2449","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24305","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24373","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24417","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24434","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24391","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24335","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16863"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1652893","reference_id":"1652893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1652893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3761","reference_id":"RHSA-2018:3761","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3761"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-16863"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wy22-ngrc-dbf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51912?format=json","vulnerability_id":"VCID-x3e7-xtzh-gugf","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15908.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15908.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15908","reference_id":"","reference_type":"","scores":[{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46236","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46296","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46242","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46298","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46294","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46303","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1619756","reference_id":"1619756","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1619756"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332","reference_id":"907332","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3650","reference_id":"RHSA-2018:3650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3650"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923064?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-15908"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x3e7-xtzh-gugf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58222?format=json","vulnerability_id":"VCID-x5ce-v7bc-ufam","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27836.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27836","reference_id":"","reference_type":"","scores":[{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43371","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43376","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43403","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43422","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43391","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43399","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43337","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43389","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27836"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354952","reference_id":"2354952","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354952"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708192","reference_id":"show_bug.cgi?id=708192","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:18:16Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708192"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"},{"reference_url":"https://usn.ubuntu.com/7623-1/","reference_id":"USN-7623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7623-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923101?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923100?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923102?format=json","purl":"pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-27836"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x5ce-v7bc-ufam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79849?format=json","vulnerability_id":"VCID-x6p8-v4bm-nqhs","summary":"ghostscript: heap-based buffer overflow in sampled_data_finish","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45949.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45949.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45949","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20214","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20363","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20423","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20147","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20287","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20315","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20269","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2021","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45944","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45944"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45949"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2048939","reference_id":"2048939","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2048939"},{"reference_url":"https://usn.ubuntu.com/5224-1/","reference_id":"USN-5224-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5224-1/"},{"reference_url":"https://usn.ubuntu.com/5224-2/","reference_id":"USN-5224-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5224-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923078?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923079?format=json","purl":"pkg:deb/debian/ghostscript@9.55.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.55.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2021-45949"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x6p8-v4bm-nqhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60656?format=json","vulnerability_id":"VCID-xg1d-bc8m-v7eg","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16289.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16289.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16289","reference_id":"","reference_type":"","scores":[{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.8059","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16298"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870244","reference_id":"1870244","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1870244"},{"reference_url":"https://security.gentoo.org/glsa/202008-20","reference_id":"GLSA-202008-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202008-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1852","reference_id":"RHSA-2021:1852","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1852"},{"reference_url":"https://usn.ubuntu.com/4469-1/","reference_id":"USN-4469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4469-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923073?format=json","purl":"pkg:deb/debian/ghostscript@9.51~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.51~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2020-16289"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xg1d-bc8m-v7eg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74680?format=json","vulnerability_id":"VCID-xg6e-rnfz-9qd6","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17183.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-17183","reference_id":"","reference_type":"","scores":[{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73491","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73499","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73493","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.7353","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73543","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73566","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73549","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73542","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-17183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632471","reference_id":"1632471","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3834","reference_id":"RHSA-2018:3834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3834"},{"reference_url":"https://usn.ubuntu.com/3773-1/","reference_id":"USN-3773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3773-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923061?format=json","purl":"pkg:deb/debian/ghostscript@9.25~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.25~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-17183"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xg6e-rnfz-9qd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51928?format=json","vulnerability_id":"VCID-xsnz-35n8-dyet","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16543.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16543.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16543","reference_id":"","reference_type":"","scores":[{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.445","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44575","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44597","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44533","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44584","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44589","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44605","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44577","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625851","reference_id":"1625851","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1625851"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908303","reference_id":"908303","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908303"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923061?format=json","purl":"pkg:deb/debian/ghostscript@9.25~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.25~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-16543"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xsnz-35n8-dyet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51926?format=json","vulnerability_id":"VCID-y99q-qn92-j7gt","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16542.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16542.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16542","reference_id":"","reference_type":"","scores":[{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6214","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6223","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62197","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62247","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62283","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62272","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6225","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1621363","reference_id":"1621363","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1621363"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332","reference_id":"907332","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907332"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2918","reference_id":"RHSA-2018:2918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2918"},{"reference_url":"https://usn.ubuntu.com/3768-1/","reference_id":"USN-3768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923064?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-16542"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y99q-qn92-j7gt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87790?format=json","vulnerability_id":"VCID-ymkg-vr2b-dker","summary":"ghostscript: CWD included in the default library search path","references":[{"reference_url":"http://bugs.ghostscript.com/show_bug.cgi?id=691339","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.ghostscript.com/show_bug.cgi?id=691339"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-0095.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-0095.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-0096.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-0096.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4820.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4820.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4820","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.296","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29649","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29574","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29528","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4820"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/01/04/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/01/04/7"},{"reference_url":"http://www.securityfocus.com/archive/1/511433","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/511433"},{"reference_url":"http://www.securityfocus.com/bid/51847","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/51847"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=771853","reference_id":"771853","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=771853"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4820","reference_id":"CVE-2010-4820","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0095","reference_id":"RHSA-2012:0095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0096","reference_id":"RHSA-2012:0096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0096"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923053?format=json","purl":"pkg:deb/debian/ghostscript@8.71~dfsg2-6.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.71~dfsg2-6.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2010-4820"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ymkg-vr2b-dker"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47316?format=json","vulnerability_id":"VCID-z1mg-r3dd-73gg","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0792.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0792.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0792","reference_id":"","reference_type":"","scores":[{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78637","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78643","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78654","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.7868","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78711","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78693","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01173","scoring_system":"epss","scoring_elements":"0.78685","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=491853","reference_id":"491853","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=491853"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523472","reference_id":"523472","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523472"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524915","reference_id":"524915","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524915"},{"reference_url":"https://security.gentoo.org/glsa/201412-17","reference_id":"GLSA-201412-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-17"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0420","reference_id":"RHSA-2009:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0421","reference_id":"RHSA-2009:0421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0421"},{"reference_url":"https://usn.ubuntu.com/757-1/","reference_id":"USN-757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/757-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923046?format=json","purl":"pkg:deb/debian/ghostscript@8.64~dfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2009-0792"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z1mg-r3dd-73gg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51932?format=json","vulnerability_id":"VCID-zbxc-g59q-vyab","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18284.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18284.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18284","reference_id":"","reference_type":"","scores":[{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55939","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56076","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56093","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56071","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.5605","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56101","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56105","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-18284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1642940","reference_id":"1642940","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1642940"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911175","reference_id":"911175","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911175"},{"reference_url":"https://security.archlinux.org/ASA-201811-3","reference_id":"ASA-201811-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-3"},{"reference_url":"https://security.archlinux.org/AVG-786","reference_id":"AVG-786","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-786"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3834","reference_id":"RHSA-2018:3834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3834"},{"reference_url":"https://usn.ubuntu.com/3803-1/","reference_id":"USN-3803-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3803-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923065?format=json","purl":"pkg:deb/debian/ghostscript@9.25~dfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.25~dfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-18284"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zbxc-g59q-vyab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36090?format=json","vulnerability_id":"VCID-zcsu-syur-kbet","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2085.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2085","reference_id":"","reference_type":"","scores":[{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34561","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34456","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34499","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.3453","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34491","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34467","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2085"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2095261","reference_id":"2095261","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2095261"},{"reference_url":"https://security.gentoo.org/glsa/202211-11","reference_id":"GLSA-202211-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-11"},{"reference_url":"https://security.gentoo.org/glsa/202309-03","reference_id":"GLSA-202309-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-03"},{"reference_url":"https://usn.ubuntu.com/5643-1/","reference_id":"USN-5643-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5643-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923081?format=json","purl":"pkg:deb/debian/ghostscript@9.56.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.56.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2022-2085"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zcsu-syur-kbet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61391?format=json","vulnerability_id":"VCID-zjc3-q4rm-r3df","summary":"Multiple integer overflows in the Ghostscript ICC library might allow for\n    user-assisted execution of arbitrary code.","references":[{"reference_url":"http://bugs.gentoo.org/show_bug.cgi?id=261087","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.gentoo.org/show_bug.cgi?id=261087"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html"},{"reference_url":"http://osvdb.org/52988","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/52988"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0584.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0584.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0584","reference_id":"","reference_type":"","scores":[{"value":"0.08952","scoring_system":"epss","scoring_elements":"0.92597","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08952","scoring_system":"epss","scoring_elements":"0.92561","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08952","scoring_system":"epss","scoring_elements":"0.92566","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08952","scoring_system":"epss","scoring_elements":"0.92573","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08952","scoring_system":"epss","scoring_elements":"0.92575","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08952","scoring_system":"epss","scoring_elements":"0.92586","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08952","scoring_system":"epss","scoring_elements":"0.92591","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08952","scoring_system":"epss","scoring_elements":"0.92596","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584"},{"reference_url":"http://secunia.com/advisories/34266","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34266"},{"reference_url":"http://secunia.com/advisories/34373","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34373"},{"reference_url":"http://secunia.com/advisories/34381","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34381"},{"reference_url":"http://secunia.com/advisories/34393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34393"},{"reference_url":"http://secunia.com/advisories/34398","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34398"},{"reference_url":"http://secunia.com/advisories/34418","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34418"},{"reference_url":"http://secunia.com/advisories/34437","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34437"},{"reference_url":"http://secunia.com/advisories/34443","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34443"},{"reference_url":"http://secunia.com/advisories/34469","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34469"},{"reference_url":"http://secunia.com/advisories/34729","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34729"},{"reference_url":"http://secunia.com/advisories/35559","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35559"},{"reference_url":"http://secunia.com/advisories/35569","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35569"},{"reference_url":"http://securitytracker.com/id?1021868","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1021868"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49327","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49327"},{"reference_url":"https://issues.rpath.com/browse/RPL-2991","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2991"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10544","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10544"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050"},{"reference_url":"http://www.auscert.org.au/render.html?it=10666","reference_id":"","reference_type":"","scores":[],"url":"http://www.auscert.org.au/render.html?it=10666"},{"reference_url":"http://www.debian.org/security/2009/dsa-1746","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1746"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:095","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:095"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:096","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:096"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0345.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0345.html"},{"reference_url":"http://www.securityfocus.com/archive/1/501994/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/501994/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/34184","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/34184"},{"reference_url":"http://www.ubuntu.com/usn/USN-743-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-743-1"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0776","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0776"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0777","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0777"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0816","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0816"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1708","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1708"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=487744","reference_id":"487744","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=487744"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522416","reference_id":"522416","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522416"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522448","reference_id":"522448","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522448"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:cms:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:argyllcms:cms:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:argyllcms:cms:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:5.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:7.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:7.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:7.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:7.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ghostscript:ghostscript:8.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0584","reference_id":"CVE-2009-0584","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0584"},{"reference_url":"https://security.gentoo.org/glsa/200903-37","reference_id":"GLSA-200903-37","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-37"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0345","reference_id":"RHSA-2009:0345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0345"},{"reference_url":"https://usn.ubuntu.com/743-1/","reference_id":"USN-743-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/743-1/"},{"reference_url":"https://usn.ubuntu.com/757-1/","reference_id":"USN-757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/757-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923046?format=json","purl":"pkg:deb/debian/ghostscript@8.64~dfsg-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@8.64~dfsg-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2009-0584"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zjc3-q4rm-r3df"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51896?format=json","vulnerability_id":"VCID-zw1d-wcpb-rfbp","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9610.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9610.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9610","reference_id":"","reference_type":"","scores":[{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61024","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61147","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9610"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475824","reference_id":"1475824","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475824"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879","reference_id":"869879","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9610"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zw1d-wcpb-rfbp"}],"risk_score":"3.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"}