Lookup for vulnerable packages by Package URL.

GET /api/packages/105246?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/105246?format=api",
    "purl": "pkg:rpm/redhat/librsvg2@2.40.20-1?arch=el7",
    "type": "rpm",
    "namespace": "redhat",
    "name": "librsvg2",
    "version": "2.40.20-1",
    "qualifiers": {
        "arch": "el7"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60940?format=api",
            "vulnerability_id": "VCID-13hw-kece-pyf7",
            "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4200.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4200.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.35682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97042",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.35682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97053",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.35682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97049",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.37285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97156",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.37285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97165",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.37285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97171",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.37285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97166",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.40022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9733",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.40022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97341",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.40022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97339",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4200"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4200"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://support.apple.com/HT208741",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208741"
                },
                {
                    "reference_url": "https://support.apple.com/HT208743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208743"
                },
                {
                    "reference_url": "https://support.apple.com/HT208850",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208850"
                },
                {
                    "reference_url": "https://support.apple.com/HT208852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208852"
                },
                {
                    "reference_url": "https://support.apple.com/HT208853",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208853"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/44566/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.exploit-db.com/exploits/44566/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/103961"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1040743"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577385",
                    "reference_id": "1577385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577385"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-9",
                    "reference_id": "ASA-201805-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-692",
                    "reference_id": "AVG-692",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-692"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1525",
                    "reference_id": "CVE-2018-4200",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1525"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44566.html",
                    "reference_id": "CVE-2018-4200",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44566.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4200",
                    "reference_id": "CVE-2018-4200",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4200"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201808-04",
                    "reference_id": "GLSA-201808-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201808-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3640-1/",
                    "reference_id": "USN-3640-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3640-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-4200"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-13hw-kece-pyf7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60942?format=api",
            "vulnerability_id": "VCID-1u61-d4ch-eya4",
            "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4204.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4204.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4204",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87524",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87514",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87537",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88032",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8802",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88021",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88034",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8799",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8801",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88017",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88028",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4204"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4204",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4204"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://support.apple.com/HT208741",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208741"
                },
                {
                    "reference_url": "https://support.apple.com/HT208743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208743"
                },
                {
                    "reference_url": "https://support.apple.com/HT208848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208848"
                },
                {
                    "reference_url": "https://support.apple.com/HT208850",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208850"
                },
                {
                    "reference_url": "https://support.apple.com/HT208852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208852"
                },
                {
                    "reference_url": "https://support.apple.com/HT208853",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208853"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/103961"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1040743"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577374",
                    "reference_id": "1577374",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577374"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4204",
                    "reference_id": "CVE-2018-4204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4204"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201808-04",
                    "reference_id": "GLSA-201808-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201808-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-4204"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1u61-d4ch-eya4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83248?format=api",
            "vulnerability_id": "VCID-29b3-s5n9-5fd8",
            "summary": "poppler: out of bounds read in pdfunite",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13988.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13988.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-13988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70726",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70674",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70719",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74684",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74685",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74717",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74731",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74755",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74734",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74681",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00841",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7471",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-13988"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13988"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602838",
                    "reference_id": "1602838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602838"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904922",
                    "reference_id": "904922",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904922"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3757-1/",
                    "reference_id": "USN-3757-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3757-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-13988"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-29b3-s5n9-5fd8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73728?format=api",
            "vulnerability_id": "VCID-9vuw-57ex-k7ez",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHBA-2019:0327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3505",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3505"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12910.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12910.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12910",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88775",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88764",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88777",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91961",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91969",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91975",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91991",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91994",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12910"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libsoup/issues/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gitlab.gnome.org/GNOME/libsoup/issues/3"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4241"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597980",
                    "reference_id": "1597980",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597980"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12910",
                    "reference_id": "CVE-2018-12910",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12910"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3701-1/",
                    "reference_id": "USN-3701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3701-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-12910"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9vuw-57ex-k7ez"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83491?format=api",
            "vulnerability_id": "VCID-kre4-9v6u-3ked",
            "summary": "poppler: NULL pointer dereference in Annot.h:AnnotPath::getCoordsLength() allows for denial of service via crafted PDF",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHBA-2019:0327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3505",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3505"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10768.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10768.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10768",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82945",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83046",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83012",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83008",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83047",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82961",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82974",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82971",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82996",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83003",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83019",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10768"
                },
                {
                    "reference_url": "https://bugs.freedesktop.org/show_bug.cgi?id=106408",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.freedesktop.org/show_bug.cgi?id=106408"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10768",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10768"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576169",
                    "reference_id": "1576169",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576169"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10768",
                    "reference_id": "CVE-2018-10768",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10768"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3647-1/",
                    "reference_id": "USN-3647-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3647-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-10768"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kre4-9v6u-3ked"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83311?format=api",
            "vulnerability_id": "VCID-p9ht-pahu-wbea",
            "summary": "accountsservice: insufficient path check in user_change_icon_file_authorized_cb() in user.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14036.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14036.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79188",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79257",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7926",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79245",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79233",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79195",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79218",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79229",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79236",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14036"
                },
                {
                    "reference_url": "https://bugs.freedesktop.org/show_bug.cgi?id=107085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.freedesktop.org/show_bug.cgi?id=107085"
                },
                {
                    "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1099699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.suse.com/show_bug.cgi?id=1099699"
                },
                {
                    "reference_url": "https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14036"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2018/07/02/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2018/07/02/2"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104757",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104757"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601019",
                    "reference_id": "1601019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601019"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903828",
                    "reference_id": "903828",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903828"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:accountsservice:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freedesktop:accountsservice:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:accountsservice:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14036",
                    "reference_id": "CVE-2018-14036",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14036"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4616-1/",
                    "reference_id": "USN-4616-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4616-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4616-2/",
                    "reference_id": "USN-4616-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4616-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-14036"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p9ht-pahu-wbea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83892?format=api",
            "vulnerability_id": "VCID-qjj9-dejh-vuaq",
            "summary": "poppler: Infinite recursion in fofi/FoFiType1C.cc:FoFiType1C::cvtGlyph() function allows denial of service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHBA-2019:0327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3505",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3505"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18267.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18267.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18267",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50793",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50935",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50929",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50907",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50891",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50848",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50874",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50832",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50889",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50887",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18267"
                },
                {
                    "reference_url": "https://bugzilla.freedesktop.org/show_bug.cgi?id=103238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.freedesktop.org/show_bug.cgi?id=103238"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18267",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18267"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578777",
                    "reference_id": "1578777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578777"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898357",
                    "reference_id": "898357",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898357"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18267",
                    "reference_id": "CVE-2017-18267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3647-1/",
                    "reference_id": "USN-3647-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3647-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2017-18267"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qjj9-dejh-vuaq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83494?format=api",
            "vulnerability_id": "VCID-qws2-p3ru-cbfw",
            "summary": "libgxps: heap based buffer over read in ft_font_face_hash function of gxps-fonts.c",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00005.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHBA-2019:0327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3505",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3505"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10733.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10733.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73978",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74074",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74033",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74026",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74065",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73984",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74011",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73982",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74016",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74029",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00799",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74052",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10733"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10733"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576111",
                    "reference_id": "1576111",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576111"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=897954",
                    "reference_id": "897954",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=897954"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10733",
                    "reference_id": "CVE-2018-10733",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10733"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-10733"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qws2-p3ru-cbfw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82082?format=api",
            "vulnerability_id": "VCID-tsw4-kqbc-kqf1",
            "summary": "freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.722",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72294",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72256",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72242",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72205",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72225",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72237",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72249",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72272",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?45955",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?45955"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752788",
                    "reference_id": "1752788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752788"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9381",
                    "reference_id": "CVE-2015-9381",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9381"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:4254",
                    "reference_id": "RHSA-2019:4254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:4254"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4126-2/",
                    "reference_id": "USN-4126-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4126-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-9381"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsw4-kqbc-kqf1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60916?format=api",
            "vulnerability_id": "VCID-v9s7-7by8-dyeg",
            "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11712.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11712.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44113",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44221",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44203",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4417",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44232",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44177",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44132",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44183",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44187",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11712"
                },
                {
                    "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=184804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.webkit.org/show_bug.cgi?id=184804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11712"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://trac.webkit.org/changeset/230886/webkit",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://trac.webkit.org/changeset/230886/webkit"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588742",
                    "reference_id": "1588742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588742"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11712",
                    "reference_id": "CVE-2018-11712",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11712"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201808-04",
                    "reference_id": "GLSA-201808-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201808-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-11712"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v9s7-7by8-dyeg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60917?format=api",
            "vulnerability_id": "VCID-vvu1-fbux-z7bn",
            "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11713.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11713.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67915",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68026",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6801",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67976",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68013",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67938",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67957",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67936",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67987",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68001",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68024",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11713"
                },
                {
                    "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=126384",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.webkit.org/show_bug.cgi?id=126384"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11713"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://trac.webkit.org/changeset/228088/webkit",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://trac.webkit.org/changeset/228088/webkit"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588739",
                    "reference_id": "1588739",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588739"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11713",
                    "reference_id": "CVE-2018-11713",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11713"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201808-04",
                    "reference_id": "GLSA-201808-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201808-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-11713"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vvu1-fbux-z7bn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60926?format=api",
            "vulnerability_id": "VCID-x1zs-swgf-efd6",
            "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4121.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4121.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.3861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97218",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.3861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97223",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.3861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97229",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.3861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9723",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.3861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9724",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.3861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97241",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.3861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97244",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.3861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97245",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.3861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97246",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.3861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97254",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.3861",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97256",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4121"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4121"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577387",
                    "reference_id": "1577387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577387"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1522",
                    "reference_id": "CVE-2018-4121",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1522"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44427.txt",
                    "reference_id": "CVE-2018-4121",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44427.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201808-04",
                    "reference_id": "GLSA-201808-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201808-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-4121"
            ],
            "risk_score": 9.0,
            "exploitability": "2.0",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x1zs-swgf-efd6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83492?format=api",
            "vulnerability_id": "VCID-xddg-3n6n-t7gk",
            "summary": "libgxps: Stack-based buffer overflow in calling glib in gxps_images_guess_content_type of gcontenttype.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHBA-2019:0327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3505",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3505"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10767.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10767.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74898",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74982",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74948",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74939",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74976",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74899",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74928",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74901",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74935",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74947",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7497",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10767"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575188",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575188"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10767"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576175",
                    "reference_id": "1576175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576175"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898133",
                    "reference_id": "898133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898133"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10767",
                    "reference_id": "CVE-2018-10767",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10767"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-10767"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xddg-3n6n-t7gk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71801?format=api",
            "vulnerability_id": "VCID-y1sm-7uec-1bc5",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2862.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2862.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2862",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90362",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90417",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90402",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90418",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90364",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90376",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90381",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90394",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90401",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90409",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90408",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2862"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488817",
                    "reference_id": "1488817",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488817"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874552",
                    "reference_id": "874552",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874552"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3418-1/",
                    "reference_id": "USN-3418-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3418-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2017-2862"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y1sm-7uec-1bc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82139?format=api",
            "vulnerability_id": "VCID-ysfs-xxjz-vbep",
            "summary": "freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9382",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73965",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74063",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74021",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74014",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74054",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73972",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73998",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73969",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74003",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74017",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74039",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9382"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?45922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?45922"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763609",
                    "reference_id": "1763609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763609"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9382",
                    "reference_id": "CVE-2015-9382",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9382"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:4254",
                    "reference_id": "RHSA-2019:4254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:4254"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4126-2/",
                    "reference_id": "USN-4126-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4126-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-9382"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ysfs-xxjz-vbep"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/librsvg2@2.40.20-1%3Farch=el7"
}