Search for vulnerabilities
Vulnerability details: VCID-me1y-m8xb-zbgf
Vulnerability ID VCID-me1y-m8xb-zbgf
Aliases CVE-2020-21710
Summary A divide by zero issue discovered in eps_print_page in gdevepsn.c in Artifex Software GhostScript 9.50 allows remote attackers to cause a denial of service via opening of crafted PDF file.
Status Published
Exploitability 0.5
Weighted Severity 5.9
Risk 3.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21710.json
epss 0.00287 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00287 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00287 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00287 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00287 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00287 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00287 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00287 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00287 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2020-21710
ssvc Track https://bugs.ghostscript.com/show_bug.cgi?id=701843
cvssv3.1 5.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
ssvc Track https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=4e713293de84b689c4ab358f3e110ea54aa81925
ssvc Track https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html
cvssv3.1 5.5 https://nvd.nist.gov/vuln/detail/CVE-2020-21710
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21710.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T20:07:44Z/ Found at https://bugs.ghostscript.com/show_bug.cgi?id=701843
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T20:07:44Z/ Found at https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=4e713293de84b689c4ab358f3e110ea54aa81925

Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T20:07:44Z/ Found at https://lists.debian.org/debian-lts-announce/2023/09/msg00029.html
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-21710
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.51776
EPSS Score 0.00287
Published At Sept. 9, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:41:22.752425+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/6364-1/ 37.0.0