{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","type":"deb","namespace":"debian","name":"ghostscript","version":"9.22~dfsg-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"9.22~dfsg-2.1","latest_non_vulnerable_version":"10.07.0~dfsg-2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51897?format=json","vulnerability_id":"VCID-1mjs-khds-v3hb","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9611.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9611.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9611","reference_id":"","reference_type":"","scores":[{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60107","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60232","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60263","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.6025","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60184","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60209","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60178","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60243","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475825","reference_id":"1475825","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475825"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869917","reference_id":"869917","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869917"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9611"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1mjs-khds-v3hb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51909?format=json","vulnerability_id":"VCID-4c92-nxd1-m7ak","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9835.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9835.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9835","reference_id":"","reference_type":"","scores":[{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.51944","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52054","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52088","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52071","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.51992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52019","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.51985","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52039","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52036","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475837","reference_id":"1475837","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475837"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869907","reference_id":"869907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869907"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9835"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4c92-nxd1-m7ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51903?format=json","vulnerability_id":"VCID-6xjs-kc8z-ukb8","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9620.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9620","reference_id":"","reference_type":"","scores":[{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71256","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76842","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76823","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76865","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76893","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76873","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76807","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9620"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475829","reference_id":"1475829","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475829"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879","reference_id":"869879","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9620"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xjs-kc8z-ukb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51894?format=json","vulnerability_id":"VCID-dax4-v297-afhg","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11714.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11714.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11714","reference_id":"","reference_type":"","scores":[{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56211","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56391","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56367","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56324","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56375","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56381","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1476192","reference_id":"1476192","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1476192"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869977","reference_id":"869977","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869977"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-11714"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dax4-v297-afhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51900?format=json","vulnerability_id":"VCID-ehmh-tjv3-ufhe","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9618.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9618.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9618","reference_id":"","reference_type":"","scores":[{"value":"0.00885","scoring_system":"epss","scoring_elements":"0.75431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80252","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80272","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.8026","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80288","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80298","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80302","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01382","scoring_system":"epss","scoring_elements":"0.80245","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9618"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475827","reference_id":"1475827","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475827"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879","reference_id":"869879","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9618"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ehmh-tjv3-ufhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51908?format=json","vulnerability_id":"VCID-gmkv-up69-u7c1","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9740.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9740.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9740","reference_id":"","reference_type":"","scores":[{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61024","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61147","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9740"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475836","reference_id":"1475836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475836"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879","reference_id":"869879","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9740"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gmkv-up69-u7c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51904?format=json","vulnerability_id":"VCID-msc6-ev6c-1bcn","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9726.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9726.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9726","reference_id":"","reference_type":"","scores":[{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56072","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56239","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56225","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56233","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475830","reference_id":"1475830","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475830"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869915","reference_id":"869915","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869915"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9726"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-msc6-ev6c-1bcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51898?format=json","vulnerability_id":"VCID-njhw-89wt-23b1","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9612.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9612.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9612","reference_id":"","reference_type":"","scores":[{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53407","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53426","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53524","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53507","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53431","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53478","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475826","reference_id":"1475826","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475826"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869916","reference_id":"869916","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869916"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9612"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-njhw-89wt-23b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51906?format=json","vulnerability_id":"VCID-p4e6-xwff-vuax","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9739.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9739.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9739","reference_id":"","reference_type":"","scores":[{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56072","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56239","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56225","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56233","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475834","reference_id":"1475834","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475834"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869910","reference_id":"869910","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869910"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9739"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p4e6-xwff-vuax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84398?format=json","vulnerability_id":"VCID-sc3j-2vy3-j3e1","summary":"ghostscript: Out-of-bounds read in mark_line_tr function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8908.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8908.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8908","reference_id":"","reference_type":"","scores":[{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60027","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60152","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.6017","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60105","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60148","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00391","scoring_system":"epss","scoring_elements":"0.60162","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8908"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1451247","reference_id":"1451247","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1451247"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-8908"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sc3j-2vy3-j3e1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51902?format=json","vulnerability_id":"VCID-szch-k4pu-wubc","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9619.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9619","reference_id":"","reference_type":"","scores":[{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70076","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70104","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70081","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70128","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70153","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.7014","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9619"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475828","reference_id":"1475828","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475828"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879","reference_id":"869879","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9619"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-szch-k4pu-wubc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51895?format=json","vulnerability_id":"VCID-tug2-npfa-nkaj","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"http://git.ghostscript.com/?p=ghostpdl.git%3Bh=8210a2864372723b49c526e2b102fdc00c9c4699","reference_id":"","reference_type":"","scores":[],"url":"http://git.ghostscript.com/?p=ghostpdl.git%3Bh=8210a2864372723b49c526e2b102fdc00c9c4699"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7948.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7948.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7948","reference_id":"","reference_type":"","scores":[{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.4525","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45342","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.4535","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45372","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.4534","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45331","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45352","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45295","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7948"},{"reference_url":"https://bugs.ghostscript.com/show_bug.cgi?id=697762","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.ghostscript.com/show_bug.cgi?id=697762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7948"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1444944","reference_id":"1444944","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1444944"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7948","reference_id":"CVE-2017-7948","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7948"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-7948"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tug2-npfa-nkaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51905?format=json","vulnerability_id":"VCID-wtcr-fwz7-j7bk","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9727.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9727.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9727","reference_id":"","reference_type":"","scores":[{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56072","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56239","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56225","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56233","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0129","scoring_system":"epss","scoring_elements":"0.7966","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475833","reference_id":"1475833","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475833"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869913","reference_id":"869913","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869913"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"},{"reference_url":"https://usn.ubuntu.com/3403-1/","reference_id":"USN-3403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9727"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wtcr-fwz7-j7bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51896?format=json","vulnerability_id":"VCID-zw1d-wcpb-rfbp","summary":"Multiple vulnerabilities have been found in GPL Ghostscript, the\n    worst of which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9610.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9610.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9610","reference_id":"","reference_type":"","scores":[{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61024","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61147","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9610"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475824","reference_id":"1475824","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1475824"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879","reference_id":"869879","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869879"},{"reference_url":"https://security.gentoo.org/glsa/201811-12","reference_id":"GLSA-201811-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923060?format=json","purl":"pkg:deb/debian/ghostscript@9.22~dfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"aliases":["CVE-2017-9610"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zw1d-wcpb-rfbp"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.22~dfsg-1%3Fdistro=trixie"}