Lookup for vulnerable packages by Package URL.

GET /api/packages/1038399?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1038399?format=api",
    "purl": "pkg:deb/debian/libx11@2:1.6.2-3",
    "type": "deb",
    "namespace": "debian",
    "name": "libx11",
    "version": "2:1.6.2-3",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "2:1.7.2-1+deb11u2",
    "latest_non_vulnerable_version": "2:1.7.2-1+deb11u2",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41702?format=api",
            "vulnerability_id": "VCID-16w3-mvk5-8bfg",
            "summary": "Multiple vulnerabilities have been found in X.Org X11 library, the\n    worst of which could allow for remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91592",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91599",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91605",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91613",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91632",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91636",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.11007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93458",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.11007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93427",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.11007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93428",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93447",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.11007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93452",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623242",
                    "reference_id": "1623242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623242"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-01",
                    "reference_id": "GLSA-201811-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2079",
                    "reference_id": "RHSA-2019:2079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2079"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-1/",
                    "reference_id": "USN-3758-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-2/",
                    "reference_id": "USN-3758-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038402?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-941j-gajx-1qc9"
                        },
                        {
                            "vulnerability": "VCID-byet-4t52-1kf5"
                        },
                        {
                            "vulnerability": "VCID-e89b-946w-g7fp"
                        },
                        {
                            "vulnerability": "VCID-r53t-w3cp-4kbm"
                        },
                        {
                            "vulnerability": "VCID-sujt-svg4-kbfp"
                        },
                        {
                            "vulnerability": "VCID-tmju-y3w5-z3es"
                        },
                        {
                            "vulnerability": "VCID-tsyg-kprr-67ck"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2"
                }
            ],
            "aliases": [
                "CVE-2018-14600"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-16w3-mvk5-8bfg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47741?format=api",
            "vulnerability_id": "VCID-22vh-wnqm-qqh5",
            "summary": "Multiple vulnerabilities have been found in X.Org  server and\n    libraries, the worse of which allowing local attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7943",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8894",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88948",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88964",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88967",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88985",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8899",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89002",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88997",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88995",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89009",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89007",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89003",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7943"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381861",
                    "reference_id": "1381861",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381861"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439",
                    "reference_id": "840439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201704-03",
                    "reference_id": "GLSA-201704-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201704-03"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-1/",
                    "reference_id": "USN-3758-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-2/",
                    "reference_id": "USN-3758-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038401?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.4-3%2Bdeb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-16w3-mvk5-8bfg"
                        },
                        {
                            "vulnerability": "VCID-941j-gajx-1qc9"
                        },
                        {
                            "vulnerability": "VCID-byet-4t52-1kf5"
                        },
                        {
                            "vulnerability": "VCID-e89b-946w-g7fp"
                        },
                        {
                            "vulnerability": "VCID-enay-5y1j-ffa4"
                        },
                        {
                            "vulnerability": "VCID-npqc-cahn-cfgk"
                        },
                        {
                            "vulnerability": "VCID-r53t-w3cp-4kbm"
                        },
                        {
                            "vulnerability": "VCID-sujt-svg4-kbfp"
                        },
                        {
                            "vulnerability": "VCID-tmju-y3w5-z3es"
                        },
                        {
                            "vulnerability": "VCID-tsyg-kprr-67ck"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-3%252Bdeb9u1"
                }
            ],
            "aliases": [
                "CVE-2016-7943"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-22vh-wnqm-qqh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37952?format=api",
            "vulnerability_id": "VCID-941j-gajx-1qc9",
            "summary": "A vulnerability in X.Org X11 library could lead to a Denial of\n    Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83844",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83938",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83937",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83857",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83873",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83875",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83898",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83905",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83921",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83915",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31535"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822",
                    "reference_id": "1961822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737",
                    "reference_id": "988737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202105-12",
                    "reference_id": "ASA-202105-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202105-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1968",
                    "reference_id": "AVG-1968",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1968"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-16",
                    "reference_id": "GLSA-202105-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3296",
                    "reference_id": "RHSA-2021:3296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3296"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3477",
                    "reference_id": "RHSA-2021:3477",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4326",
                    "reference_id": "RHSA-2021:4326",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4326"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4966-1/",
                    "reference_id": "USN-4966-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4966-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4966-2/",
                    "reference_id": "USN-4966-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4966-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038402?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-941j-gajx-1qc9"
                        },
                        {
                            "vulnerability": "VCID-byet-4t52-1kf5"
                        },
                        {
                            "vulnerability": "VCID-e89b-946w-g7fp"
                        },
                        {
                            "vulnerability": "VCID-r53t-w3cp-4kbm"
                        },
                        {
                            "vulnerability": "VCID-sujt-svg4-kbfp"
                        },
                        {
                            "vulnerability": "VCID-tmju-y3w5-z3es"
                        },
                        {
                            "vulnerability": "VCID-tsyg-kprr-67ck"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2021-31535"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-941j-gajx-1qc9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58827?format=api",
            "vulnerability_id": "VCID-byet-4t52-1kf5",
            "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27561",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27774",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27616",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27626",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.276",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27812",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27604",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2767",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27714",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27718",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27675",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43785"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242252",
                    "reference_id": "2242252",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242252"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-43785",
                    "reference_id": "CVE-2023-43785",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-43785"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-21",
                    "reference_id": "GLSA-202407-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2145",
                    "reference_id": "RHSA-2024:2145",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2145"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2973",
                    "reference_id": "RHSA-2024:2973",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2973"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6407-1/",
                    "reference_id": "USN-6407-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6407-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6407-2/",
                    "reference_id": "USN-6407-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6407-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2023-43785"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byet-4t52-1kf5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58828?format=api",
            "vulnerability_id": "VCID-e89b-946w-g7fp",
            "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24377",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24557",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24398",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24414",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24406",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24594",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24371",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2444",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24485",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24499",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24455",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242253",
                    "reference_id": "2242253",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242253"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-43786",
                    "reference_id": "CVE-2023-43786",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-43786"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-21",
                    "reference_id": "GLSA-202407-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2145",
                    "reference_id": "RHSA-2024:2145",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2145"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2973",
                    "reference_id": "RHSA-2024:2973",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2973"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6407-1/",
                    "reference_id": "USN-6407-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6407-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6407-2/",
                    "reference_id": "USN-6407-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6407-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6408-1/",
                    "reference_id": "USN-6408-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6408-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6408-2/",
                    "reference_id": "USN-6408-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6408-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2023-43786"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e89b-946w-g7fp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41701?format=api",
            "vulnerability_id": "VCID-enay-5y1j-ffa4",
            "summary": "Multiple vulnerabilities have been found in X.Org X11 library, the\n    worst of which could allow for remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82256",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82269",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82288",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82283",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8231",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82317",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82337",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82508",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82473",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82468",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82504",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623250",
                    "reference_id": "1623250",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623250"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-01",
                    "reference_id": "GLSA-201811-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2079",
                    "reference_id": "RHSA-2019:2079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2079"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-1/",
                    "reference_id": "USN-3758-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-2/",
                    "reference_id": "USN-3758-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038402?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-941j-gajx-1qc9"
                        },
                        {
                            "vulnerability": "VCID-byet-4t52-1kf5"
                        },
                        {
                            "vulnerability": "VCID-e89b-946w-g7fp"
                        },
                        {
                            "vulnerability": "VCID-r53t-w3cp-4kbm"
                        },
                        {
                            "vulnerability": "VCID-sujt-svg4-kbfp"
                        },
                        {
                            "vulnerability": "VCID-tmju-y3w5-z3es"
                        },
                        {
                            "vulnerability": "VCID-tsyg-kprr-67ck"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2"
                }
            ],
            "aliases": [
                "CVE-2018-14599"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-enay-5y1j-ffa4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47736?format=api",
            "vulnerability_id": "VCID-ngsj-tzms-97e8",
            "summary": "Multiple vulnerabilities have been found in X.Org  server and\n    libraries, the worse of which allowing local attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89332",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89337",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89348",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8935",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89367",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89371",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8938",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89377",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89373",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89388",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89385",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7942"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381859",
                    "reference_id": "1381859",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381859"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439",
                    "reference_id": "840439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201704-03",
                    "reference_id": "GLSA-201704-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201704-03"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-1/",
                    "reference_id": "USN-3758-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-2/",
                    "reference_id": "USN-3758-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038401?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.4-3%2Bdeb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-16w3-mvk5-8bfg"
                        },
                        {
                            "vulnerability": "VCID-941j-gajx-1qc9"
                        },
                        {
                            "vulnerability": "VCID-byet-4t52-1kf5"
                        },
                        {
                            "vulnerability": "VCID-e89b-946w-g7fp"
                        },
                        {
                            "vulnerability": "VCID-enay-5y1j-ffa4"
                        },
                        {
                            "vulnerability": "VCID-npqc-cahn-cfgk"
                        },
                        {
                            "vulnerability": "VCID-r53t-w3cp-4kbm"
                        },
                        {
                            "vulnerability": "VCID-sujt-svg4-kbfp"
                        },
                        {
                            "vulnerability": "VCID-tmju-y3w5-z3es"
                        },
                        {
                            "vulnerability": "VCID-tsyg-kprr-67ck"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-3%252Bdeb9u1"
                }
            ],
            "aliases": [
                "CVE-2016-7942"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ngsj-tzms-97e8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41700?format=api",
            "vulnerability_id": "VCID-npqc-cahn-cfgk",
            "summary": "Multiple vulnerabilities have been found in X.Org X11 library, the\n    worst of which could allow for remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78032",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78041",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7807",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78053",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78079",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78083",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86683",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86671",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86664",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86677",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623238",
                    "reference_id": "1623238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623238"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-01",
                    "reference_id": "GLSA-201811-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2079",
                    "reference_id": "RHSA-2019:2079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2079"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-1/",
                    "reference_id": "USN-3758-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-2/",
                    "reference_id": "USN-3758-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038402?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.7-1%2Bdeb10u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-941j-gajx-1qc9"
                        },
                        {
                            "vulnerability": "VCID-byet-4t52-1kf5"
                        },
                        {
                            "vulnerability": "VCID-e89b-946w-g7fp"
                        },
                        {
                            "vulnerability": "VCID-r53t-w3cp-4kbm"
                        },
                        {
                            "vulnerability": "VCID-sujt-svg4-kbfp"
                        },
                        {
                            "vulnerability": "VCID-tmju-y3w5-z3es"
                        },
                        {
                            "vulnerability": "VCID-tsyg-kprr-67ck"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.7-1%252Bdeb10u2"
                }
            ],
            "aliases": [
                "CVE-2018-14598"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-npqc-cahn-cfgk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58829?format=api",
            "vulnerability_id": "VCID-r53t-w3cp-4kbm",
            "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12695",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12804",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12669",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12575",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12586",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12852",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12657",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12736",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12787",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12756",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12717",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43787"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242254",
                    "reference_id": "2242254",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242254"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-43787",
                    "reference_id": "CVE-2023-43787",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-43787"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-21",
                    "reference_id": "GLSA-202407-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2145",
                    "reference_id": "RHSA-2024:2145",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2145"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2973",
                    "reference_id": "RHSA-2024:2973",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2973"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6407-1/",
                    "reference_id": "USN-6407-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6407-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6407-2/",
                    "reference_id": "USN-6407-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6407-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6408-1/",
                    "reference_id": "USN-6408-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6408-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6408-2/",
                    "reference_id": "USN-6408-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6408-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2023-43787"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r53t-w3cp-4kbm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58826?format=api",
            "vulnerability_id": "VCID-sujt-svg4-kbfp",
            "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24061",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.241",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23883",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23949",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23995",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24012",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23913",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23922",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23911",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23893",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3138"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133",
                    "reference_id": "1038133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213748",
                    "reference_id": "2213748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213748"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-21",
                    "reference_id": "GLSA-202407-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6497",
                    "reference_id": "RHSA-2023:6497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7029",
                    "reference_id": "RHSA-2023:7029",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7029"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1088",
                    "reference_id": "RHSA-2024:1088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1088"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1417",
                    "reference_id": "RHSA-2024:1417",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1417"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6168-1/",
                    "reference_id": "USN-6168-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6168-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6168-2/",
                    "reference_id": "USN-6168-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6168-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2023-3138"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sujt-svg4-kbfp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59404?format=api",
            "vulnerability_id": "VCID-tmju-y3w5-z3es",
            "summary": "Multiple vulnerabilities have been found in X.org X11 library, the\n    worst of which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35381",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3558",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35606",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35488",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35534",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35559",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35568",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35523",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35501",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35541",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35531",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3548",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872473",
                    "reference_id": "1872473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872473"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008",
                    "reference_id": "969008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-18",
                    "reference_id": "GLSA-202008-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-18"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4908",
                    "reference_id": "RHSA-2020:4908",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4908"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4946",
                    "reference_id": "RHSA-2020:4946",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4946"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1804",
                    "reference_id": "RHSA-2021:1804",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1804"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4487-1/",
                    "reference_id": "USN-4487-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4487-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4487-2/",
                    "reference_id": "USN-4487-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4487-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2020-14363"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmju-y3w5-z3es"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59403?format=api",
            "vulnerability_id": "VCID-tsyg-kprr-67ck",
            "summary": "Multiple vulnerabilities have been found in X.org X11 library, the\n    worst of which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14344",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3701",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37104",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37087",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37186",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37215",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37046",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37097",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37109",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3712",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37086",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37058",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14344"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862255",
                    "reference_id": "1862255",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862255"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1212",
                    "reference_id": "AVG-1212",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1212"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-18",
                    "reference_id": "GLSA-202008-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-18"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1804",
                    "reference_id": "RHSA-2021:1804",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1804"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4487-1/",
                    "reference_id": "USN-4487-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4487-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4487-2/",
                    "reference_id": "USN-4487-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4487-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052558?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2"
                }
            ],
            "aliases": [
                "CVE-2020-14344"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsyg-kprr-67ck"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55988?format=api",
            "vulnerability_id": "VCID-e19k-nptv-ffgr",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83061",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83077",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83091",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8309",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83114",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83122",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83138",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83132",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83128",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83165",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83166",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83169",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7439"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209943",
                    "reference_id": "1209943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209943"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436",
                    "reference_id": "RHSA-2014:1436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1436"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2568-1/",
                    "reference_id": "USN-2568-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2568-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571227?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-16w3-mvk5-8bfg"
                        },
                        {
                            "vulnerability": "VCID-22vh-wnqm-qqh5"
                        },
                        {
                            "vulnerability": "VCID-941j-gajx-1qc9"
                        },
                        {
                            "vulnerability": "VCID-byet-4t52-1kf5"
                        },
                        {
                            "vulnerability": "VCID-e19k-nptv-ffgr"
                        },
                        {
                            "vulnerability": "VCID-e89b-946w-g7fp"
                        },
                        {
                            "vulnerability": "VCID-enay-5y1j-ffa4"
                        },
                        {
                            "vulnerability": "VCID-ngsj-tzms-97e8"
                        },
                        {
                            "vulnerability": "VCID-npqc-cahn-cfgk"
                        },
                        {
                            "vulnerability": "VCID-r53t-w3cp-4kbm"
                        },
                        {
                            "vulnerability": "VCID-sujt-svg4-kbfp"
                        },
                        {
                            "vulnerability": "VCID-tmju-y3w5-z3es"
                        },
                        {
                            "vulnerability": "VCID-tsyg-kprr-67ck"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038399?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.2-3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-16w3-mvk5-8bfg"
                        },
                        {
                            "vulnerability": "VCID-22vh-wnqm-qqh5"
                        },
                        {
                            "vulnerability": "VCID-941j-gajx-1qc9"
                        },
                        {
                            "vulnerability": "VCID-byet-4t52-1kf5"
                        },
                        {
                            "vulnerability": "VCID-e89b-946w-g7fp"
                        },
                        {
                            "vulnerability": "VCID-enay-5y1j-ffa4"
                        },
                        {
                            "vulnerability": "VCID-ngsj-tzms-97e8"
                        },
                        {
                            "vulnerability": "VCID-npqc-cahn-cfgk"
                        },
                        {
                            "vulnerability": "VCID-r53t-w3cp-4kbm"
                        },
                        {
                            "vulnerability": "VCID-sujt-svg4-kbfp"
                        },
                        {
                            "vulnerability": "VCID-tmju-y3w5-z3es"
                        },
                        {
                            "vulnerability": "VCID-tsyg-kprr-67ck"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.2-3"
                }
            ],
            "aliases": [
                "CVE-2013-7439"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e19k-nptv-ffgr"
        }
    ],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.2-3"
}