{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/141661?format=json","vulnerability_id":"VCID-dyk7-kdb2-e3ap","summary":"Heap-based buffer overflow in gdevwpr2.c in Ghostscript 9.04, when processing the OutputFile device parameter, allows user-assisted remote attackers to execute arbitrary code via a long file name in a PostScript document.  NOTE: as of 20120314, the developer was not able to reproduce the issue and disputed it","aliases":[{"alias":"CVE-2012-4875"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923055?format=json","purl":"pkg:deb/debian/ghostscript@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923039?format=json","purl":"pkg:deb/debian/ghostscript@9.53.3~dfsg-7%2Bdeb11u7?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-j6nh-rfbg-z7f7"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@9.53.3~dfsg-7%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923037?format=json","purl":"pkg:deb/debian/ghostscript@10.0.0~dfsg-11%2Bdeb12u8?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1nh4-crmx-jfb5"},{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-rdmp-hfbg-2kh5"},{"vulnerability":"VCID-t3n4-wrgr-bkdy"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.0.0~dfsg-11%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923041?format=json","purl":"pkg:deb/debian/ghostscript@10.05.1~dfsg-1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k837-n44h-pkbm"},{"vulnerability":"VCID-wzad-uxqp-63h3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.05.1~dfsg-1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923040?format=json","purl":"pkg:deb/debian/ghostscript@10.07.0~dfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/ghostscript@10.07.0~dfsg-2%3Fdistro=trixie"}],"affected_packages":[],"references":[{"reference_url":"http://bugs.ghostscript.com/show_bug.cgi?id=692856","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.ghostscript.com/show_bug.cgi?id=692856"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4875","reference_id":"","reference_type":"","scores":[{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92843","published_at":"2026-05-14T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92727","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92734","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.9274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92747","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92751","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92757","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92755","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92756","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92767","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92778","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92773","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92782","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92795","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92807","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92812","published_at":"2026-05-11T12:55:00Z"},{"value":"0.09321","scoring_system":"epss","scoring_elements":"0.92818","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4875"},{"reference_url":"http://secunia.com/advisories/47855","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/47855"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/74554","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/74554"},{"reference_url":"http://www.securityfocus.com/bid/52864","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/52864"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:artifex:gpl_ghostscript:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:artifex:gpl_ghostscript:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4875","reference_id":"CVE-2012-4875","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4875"}],"weaknesses":[{"cwe_id":119,"name":"Improper Restriction of Operations within the Bounds of a Memory Buffer","description":"The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer."}],"exploits":[],"severity_range_score":"9.3 - 9.3","exploitability":null,"weighted_severity":null,"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dyk7-kdb2-e3ap"}