{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","type":"deb","namespace":"debian","name":"ghostscript","version":"0","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8.61.dfsg.1~svn8187-1.1","latest_non_vulnerable_version":"10.07.0~dfsg-2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58220?format=json","vulnerability_id":"VCID-3kq9-v371-j3ew","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27834.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27834.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27834","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06164","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06185","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06177","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06172","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06147","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354948","reference_id":"2354948","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354948"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708253","reference_id":"show_bug.cgi?id=708253","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:36:54Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708253"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923100?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923102?format=json","purl":"pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-27834"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3kq9-v371-j3ew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78135?format=json","vulnerability_id":"VCID-4ahm-1cab-auba","summary":"ghostscript: Incomplete fix for CVE-2020-16305","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4042.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4042.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4042","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10562","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10517","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10523","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10589","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10585","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10449","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4042"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228151","reference_id":"2228151","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:58:03Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228151"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-4042","reference_id":"CVE-2023-4042","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:58:03Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-4042"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7053","reference_id":"RHSA-2023:7053","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:58:03Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7053"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2023-4042"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ahm-1cab-auba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75001?format=json","vulnerability_id":"VCID-5b3p-nax3-tuc5","summary":"ghostscript: stack-based buffer overflow in the pdfi_apply_filter()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29506.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29506.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29506","reference_id":"","reference_type":"","scores":[{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35946","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36067","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.3593","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.3598","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36003","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35971","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29506"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295626","reference_id":"2295626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295626"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/07/03/7","reference_id":"7","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T14:18:42Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/07/03/7"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Bh=77dc7f699beba606937b7ea23b50cf5974fa64b1","reference_id":"?p=ghostpdl.git%3Bh=77dc7f699beba606937b7ea23b50cf5974fa64b1","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T14:18:42Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Bh=77dc7f699beba606937b7ea23b50cf5974fa64b1"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510","reference_id":"show_bug.cgi?id=707510","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T14:18:42Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510"},{"reference_url":"https://usn.ubuntu.com/6897-1/","reference_id":"USN-6897-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6897-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923093?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923094?format=json","purl":"pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-29506"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5b3p-nax3-tuc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56846?format=json","vulnerability_id":"VCID-9q8n-jfqs-bkg6","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46952.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46952.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46952","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21684","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21634","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21711","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21768","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21781","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21741","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325041","reference_id":"2325041","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325041"},{"reference_url":"https://security.gentoo.org/glsa/202501-06","reference_id":"GLSA-202501-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-06"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b1f0827c30f59a2dcbc8a39e42cace7a1de35f7f","reference_id":"?id=b1f0827c30f59a2dcbc8a39e42cace7a1de35f7f","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:27:55Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=b1f0827c30f59a2dcbc8a39e42cace7a1de35f7f"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:27:55Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7422","reference_id":"RHSA-2025:7422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7499","reference_id":"RHSA-2025:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7499"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708001","reference_id":"show_bug.cgi?id=708001","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:27:55Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708001"},{"reference_url":"https://usn.ubuntu.com/7103-1/","reference_id":"USN-7103-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7103-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923097?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923099?format=json","purl":"pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-46952"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9q8n-jfqs-bkg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75003?format=json","vulnerability_id":"VCID-9sqj-kk7j-43fg","summary":"ghostscript: heap buffer overflow via the PDFPassword parameter","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29509.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29509.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29509","reference_id":"","reference_type":"","scores":[{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84243","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84187","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84205","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84206","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84233","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0215","scoring_system":"epss","scoring_elements":"0.84246","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29509"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295628","reference_id":"2295628","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295628"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/07/03/7","reference_id":"7","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:36:26Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/07/03/7"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Bh=917b3a71fb20748965254631199ad98210d6c2fb","reference_id":"?p=ghostpdl.git%3Bh=917b3a71fb20748965254631199ad98210d6c2fb","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:36:26Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Bh=917b3a71fb20748965254631199ad98210d6c2fb"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510","reference_id":"show_bug.cgi?id=707510","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:36:26Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510"},{"reference_url":"https://usn.ubuntu.com/6897-1/","reference_id":"USN-6897-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6897-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923093?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923094?format=json","purl":"pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-29509"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9sqj-kk7j-43fg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/141661?format=json","vulnerability_id":"VCID-dyk7-kdb2-e3ap","summary":"Heap-based buffer overflow in gdevwpr2.c in Ghostscript 9.04, when processing the OutputFile device parameter, allows user-assisted remote attackers to execute arbitrary code via a long file name in a PostScript document.  NOTE: as of 20120314, the developer was not able to reproduce the issue and disputed it","references":[{"reference_url":"http://bugs.ghostscript.com/show_bug.cgi?id=692856","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.ghostscript.com/show_bug.cgi?id=692856"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4875","reference_id":"","reference_type":"","scores":[{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92756","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92727","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92734","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.9274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92747","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92751","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92757","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92755","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4875"},{"reference_url":"http://secunia.com/advisories/47855","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/47855"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/74554","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/74554"},{"reference_url":"http://www.securityfocus.com/bid/52864","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/52864"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4875","reference_id":"CVE-2012-4875","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4875"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2012-4875"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dyk7-kdb2-e3ap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75004?format=json","vulnerability_id":"VCID-fqa1-u16c-qyha","summary":"ghostscript: stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29507.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29507.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29507","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30299","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30348","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3026","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30263","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3022","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29507"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295647","reference_id":"2295647","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295647"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/07/03/7","reference_id":"7","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:10:58Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/07/03/7"},{"reference_url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=7745dbe24514","reference_id":"?p=ghostpdl.git%3Ba=commitdiff%3Bh=7745dbe24514","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:10:58Z/"}],"url":"https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=7745dbe24514"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510","reference_id":"show_bug.cgi?id=707510","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:10:58Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707510"},{"reference_url":"https://usn.ubuntu.com/6897-1/","reference_id":"USN-6897-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6897-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923093?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923094?format=json","purl":"pkg:deb/debian/ghostscript@10.03.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.03.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-29507"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fqa1-u16c-qyha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58223?format=json","vulnerability_id":"VCID-jxhs-q6yu-muft","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27837.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27837.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27837","reference_id":"","reference_type":"","scores":[{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60316","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60365","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60381","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60401","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60368","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27837"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354961","reference_id":"2354961","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354961"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-27837"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jxhs-q6yu-muft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32119?format=json","vulnerability_id":"VCID-kbfn-852g-fker","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which can resulting in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6196.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6196","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57417","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57501","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5755","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5757","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57549","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57527","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6196"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1427440","reference_id":"1427440","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1427440"},{"reference_url":"https://security.gentoo.org/glsa/201708-06","reference_id":"GLSA-201708-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201708-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-6196"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbfn-852g-fker"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58224?format=json","vulnerability_id":"VCID-kck6-wj6h-3ybr","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46646.json","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46646.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-46646","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2509","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24903","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2499","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25128","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-46646"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2362446","reference_id":"2362446","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2362446"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f14ea81e6c3d2f51593f23cdf13c4679a18f1a3f","reference_id":"?id=f14ea81e6c3d2f51593f23cdf13c4679a18f1a3f","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-29T13:44:40Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f14ea81e6c3d2f51593f23cdf13c4679a18f1a3f"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708311","reference_id":"show_bug.cgi?id=708311","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-29T13:44:40Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708311"},{"reference_url":"https://usn.ubuntu.com/7473-1/","reference_id":"USN-7473-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7473-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923102?format=json","purl":"pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-46646"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kck6-wj6h-3ybr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56849?format=json","vulnerability_id":"VCID-p7nb-9g3f-2bf3","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46954.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46954","reference_id":"","reference_type":"","scores":[{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32258","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32422","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32296","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32326","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32288","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-46954"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325044","reference_id":"2325044","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2325044"},{"reference_url":"https://security.gentoo.org/glsa/202501-06","reference_id":"GLSA-202501-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-06"},{"reference_url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=55f587dd039282316f512e1bea64218fd991f934","reference_id":"?id=55f587dd039282316f512e1bea64218fd991f934","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:24:52Z/"}],"url":"https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=55f587dd039282316f512e1bea64218fd991f934"},{"reference_url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html","reference_id":"News.html","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:24:52Z/"}],"url":"https://github.com/ArtifexSoftware/ghostpdl/blob/master/doc/News.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7422","reference_id":"RHSA-2025:7422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7499","reference_id":"RHSA-2025:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7499"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=707788","reference_id":"show_bug.cgi?id=707788","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T20:24:52Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=707788"},{"reference_url":"https://usn.ubuntu.com/7103-1/","reference_id":"USN-7103-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7103-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923099?format=json","purl":"pkg:deb/debian/ghostscript@10.04.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.04.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2024-46954"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p7nb-9g3f-2bf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58219?format=json","vulnerability_id":"VCID-pwas-b3sw-guav","summary":"Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which can lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27833.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27833.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27833","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09356","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09412","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0944","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09453","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09426","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09407","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09318","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09392","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354954","reference_id":"2354954","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2354954"},{"reference_url":"https://security.gentoo.org/glsa/202508-02","reference_id":"GLSA-202508-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202508-02"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=708259","reference_id":"show_bug.cgi?id=708259","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-26T13:36:49Z/"}],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=708259"},{"reference_url":"https://usn.ubuntu.com/7378-1/","reference_id":"USN-7378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7378-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923100?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923102?format=json","purl":"pkg:deb/debian/ghostscript@10.05.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2025-27833"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pwas-b3sw-guav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84682?format=json","vulnerability_id":"VCID-tfdu-yxt7-87fw","summary":"ghostscript: NULL pointer dereference in the pfd14_pop_transparency_group function","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=d621292fb2c8157d9899dcd83fd04dd250e30fe4","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=d621292fb2c8157d9899dcd83fd04dd250e30fe4"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10218.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10218","reference_id":"","reference_type":"","scores":[{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60027","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60152","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60162","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.6017","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60105","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60148","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10218"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=697444","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=697444"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441568","reference_id":"1441568","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1441568"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10218","reference_id":"CVE-2016-10218","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10218"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2016-10218"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tfdu-yxt7-87fw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77917?format=json","vulnerability_id":"VCID-wj1v-tg7c-8ydn","summary":"ghostscript: dangling pointer in gdev_prn_open_printer_seekable()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46751.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46751.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46751","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29589","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2946","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29522","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29562","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29564","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29519","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29467","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46751"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253365","reference_id":"2253365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253365"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4362","reference_id":"RHSA-2025:4362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7422","reference_id":"RHSA-2025:7422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7422"},{"reference_url":"https://usn.ubuntu.com/6551-1/","reference_id":"USN-6551-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6551-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923090?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923091?format=json","purl":"pkg:deb/debian/ghostscript@10.02.1~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.02.1~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2023-46751"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wj1v-tg7c-8ydn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82964?format=json","vulnerability_id":"VCID-wy22-ngrc-dbf7","summary":"ghostscript: incomplete fix for CVE-2018-16509","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16863.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16863.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16863","reference_id":"","reference_type":"","scores":[{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24364","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2449","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24305","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24373","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24417","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24434","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24391","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24335","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16863"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1652893","reference_id":"1652893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1652893"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3761","reference_id":"RHSA-2018:3761","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3761"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2018-16863"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wy22-ngrc-dbf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36090?format=json","vulnerability_id":"VCID-zcsu-syur-kbet","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2085.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2085","reference_id":"","reference_type":"","scores":[{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34561","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34456","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34499","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.3453","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34491","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34467","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2085"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2095261","reference_id":"2095261","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2095261"},{"reference_url":"https://security.gentoo.org/glsa/202211-11","reference_id":"GLSA-202211-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-11"},{"reference_url":"https://security.gentoo.org/glsa/202309-03","reference_id":"GLSA-202309-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-03"},{"reference_url":"https://usn.ubuntu.com/5643-1/","reference_id":"USN-5643-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5643-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923081?format=json","purl":"pkg:deb/debian/ghostscript@9.56.0~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.56.0~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2022-2085"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zcsu-syur-kbet"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"}