Lookup for vulnerable packages by Package URL.

GET /api/packages/371632?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/371632?format=api",
    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-13",
    "type": "alpm",
    "namespace": "archlinux",
    "name": "libwmf",
    "version": "0.2.8.4-13",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "0.2.8.4-14",
    "latest_non_vulnerable_version": "0.2.8.4-14",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41480?format=api",
            "vulnerability_id": "VCID-4ehv-84qa-fubx",
            "summary": "The GD library is prone to a buffer overflow vulnerability.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3546.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8858",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88589",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88606",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88608",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88627",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04125",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88643",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89327",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89322",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89319",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89332",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04663",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89331",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=529213",
                    "reference_id": "529213",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529213"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534",
                    "reference_id": "552534",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552534"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525",
                    "reference_id": "601525",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201001-03",
                    "reference_id": "GLSA-201001-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201001-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201006-16",
                    "reference_id": "GLSA-201006-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201006-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0003",
                    "reference_id": "RHSA-2010:0003",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0003"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0040",
                    "reference_id": "RHSA-2010:0040",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0040"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/854-1/",
                    "reference_id": "USN-854-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/854-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371633?format=api",
                    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14"
                }
            ],
            "aliases": [
                "CVE-2009-3546"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ehv-84qa-fubx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36658?format=api",
            "vulnerability_id": "VCID-5qdc-jjh5-gfba",
            "summary": "Multiple vulnerabilities have been found in libwmf allowing remote\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4588.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4588.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90441",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90388",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90391",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90403",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90407",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90421",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90428",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90435",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90443",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1272993",
                    "reference_id": "1272993",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1272993"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644",
                    "reference_id": "787644",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-03",
                    "reference_id": "GLSA-201602-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1917",
                    "reference_id": "RHSA-2015:1917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1917"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2670-1/",
                    "reference_id": "USN-2670-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2670-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371633?format=api",
                    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14"
                }
            ],
            "aliases": [
                "CVE-2015-4588"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5qdc-jjh5-gfba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36661?format=api",
            "vulnerability_id": "VCID-5we4-7e6c-7bb6",
            "summary": "Multiple vulnerabilities have been found in libwmf allowing remote\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4696.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4696.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83528",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83426",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83439",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83453",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83452",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83476",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83486",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.835",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83494",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8349",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83526",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83527",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4696"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235669",
                    "reference_id": "1235669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235669"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192",
                    "reference_id": "784192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-03",
                    "reference_id": "GLSA-201602-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1917",
                    "reference_id": "RHSA-2015:1917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1917"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2670-1/",
                    "reference_id": "USN-2670-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2670-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371633?format=api",
                    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14"
                }
            ],
            "aliases": [
                "CVE-2015-4696"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5we4-7e6c-7bb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41563?format=api",
            "vulnerability_id": "VCID-7d1e-wnq6-4qfr",
            "summary": "Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
                },
                {
                    "reference_url": "http://bugs.libgd.org/?do=details&task_id=74",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.libgd.org/?do=details&task_id=74"
                },
                {
                    "reference_url": "http://bugs.libgd.org/?do=details&task_id=92",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.libgd.org/?do=details&task_id=92"
                },
                {
                    "reference_url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
                },
                {
                    "reference_url": "http://osvdb.org/42062",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/42062"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3477.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91616",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91621",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91601",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91599",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91745",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91786",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91789",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91779",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91753",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91759",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91766",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3477"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25860"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26272"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26390"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26415",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26415"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26467",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26467"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26663"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26766"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26856"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30168",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30168"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31168",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31168"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42813"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200708-05.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200711-34.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200805-13.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-1643",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-1643"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1613"
                },
                {
                    "reference_url": "http://www.libgd.org/ReleaseNote020035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.libgd.org/ReleaseNote020035"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
                },
                {
                    "reference_url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/24651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/24651"
                },
                {
                    "reference_url": "http://www.trustix.org/errata/2007/0024/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.trustix.org/errata/2007/0024/"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0022"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277221",
                    "reference_id": "277221",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277221"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525",
                    "reference_id": "601525",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601525"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3477",
                    "reference_id": "CVE-2007-3477",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3477"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200708-05",
                    "reference_id": "GLSA-200708-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200708-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/854-1/",
                    "reference_id": "USN-854-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/854-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371633?format=api",
                    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14"
                }
            ],
            "aliases": [
                "CVE-2007-3477"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7d1e-wnq6-4qfr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36657?format=api",
            "vulnerability_id": "VCID-9fnx-1dty-4yg9",
            "summary": "Multiple vulnerabilities have been found in libwmf allowing remote\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0848.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0848.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89347",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89292",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89298",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89312",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89313",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8933",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89335",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89343",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8934",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89337",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89351",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8935",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0848"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227243",
                    "reference_id": "1227243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227243"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644",
                    "reference_id": "787644",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-03",
                    "reference_id": "GLSA-201602-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1917",
                    "reference_id": "RHSA-2015:1917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1917"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2670-1/",
                    "reference_id": "USN-2670-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2670-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371633?format=api",
                    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14"
                }
            ],
            "aliases": [
                "CVE-2015-0848"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9fnx-1dty-4yg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88770?format=api",
            "vulnerability_id": "VCID-busj-qfth-v7e3",
            "summary": "gd: buffer overrun",
            "references": [
                {
                    "reference_url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224607"
                },
                {
                    "reference_url": "http://fedoranews.org/cms/node/2631",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://fedoranews.org/cms/node/2631"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
                },
                {
                    "reference_url": "http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2007-0155.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2007-0155.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0455.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04925",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89618",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04925",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89579",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04925",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89626",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04925",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89582",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04925",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89596",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04925",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89613",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90231",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90217",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90235",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90222",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0455"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0455"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23916"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24022"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24052"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24053"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24107"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24143"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24151",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24151"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24924"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24945"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24965"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25575"
                },
                {
                    "reference_url": "http://secunia.com/advisories/29157",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/29157"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42813"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-1030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-1030"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-1268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-1268"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11303"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:035"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:036"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:038"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:109"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0153.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0153.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0162.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0162.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/466166/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/466166/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/22289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/22289"
                },
                {
                    "reference_url": "http://www.trustix.org/errata/2007/0007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.trustix.org/errata/2007/0007"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-473-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-473-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/0400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/0400"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0022"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=224607",
                    "reference_id": "224607",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=224607"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982",
                    "reference_id": "408982",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408982"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gd_graphics_library_project:gd_graphics_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0455",
                    "reference_id": "CVE-2007-0455",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0153",
                    "reference_id": "RHSA-2007:0153",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0153"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0155",
                    "reference_id": "RHSA-2007:0155",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0155"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0162",
                    "reference_id": "RHSA-2007:0162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0162"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0146",
                    "reference_id": "RHSA-2008:0146",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0146"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/473-1/",
                    "reference_id": "USN-473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/473-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371633?format=api",
                    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14"
                }
            ],
            "aliases": [
                "CVE-2007-0455"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-busj-qfth-v7e3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41557?format=api",
            "vulnerability_id": "VCID-ek5b-jujn-bqet",
            "summary": "Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
                },
                {
                    "reference_url": "http://bugs.libgd.org/?do=details&task_id=94",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.libgd.org/?do=details&task_id=94"
                },
                {
                    "reference_url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
                },
                {
                    "reference_url": "http://osvdb.org/37744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/37744"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3473.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93196",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.10285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93188",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93165",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93167",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93183",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.12126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93768",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.12126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93807",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.12126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93802",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.12126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93778",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93787",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93791",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.938",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3473"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3473"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25855"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25860"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26272"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26390"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26415",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26415"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26467",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26467"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26663"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26766"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26856"
                },
                {
                    "reference_url": "http://secunia.com/advisories/29157",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/29157"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30168",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30168"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42813"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200708-05.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200711-34.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200805-13.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35109"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-1643",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-1643"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11806"
                },
                {
                    "reference_url": "http://www.libgd.org/ReleaseNote020035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.libgd.org/ReleaseNote020035"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
                },
                {
                    "reference_url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/24651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/24651"
                },
                {
                    "reference_url": "http://www.trustix.org/errata/2007/0024/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.trustix.org/errata/2007/0024/"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/2336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/2336"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0022"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=276791",
                    "reference_id": "276791",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=276791"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3473",
                    "reference_id": "CVE-2007-3473",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3473"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c",
                    "reference_id": "CVE-2007-3473;OSVDB-37744",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30251.c"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/24651/info",
                    "reference_id": "CVE-2007-3473;OSVDB-37744",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/24651/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200708-05",
                    "reference_id": "GLSA-200708-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200708-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0146",
                    "reference_id": "RHSA-2008:0146",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0146"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371633?format=api",
                    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14"
                }
            ],
            "aliases": [
                "CVE-2007-3473"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ek5b-jujn-bqet"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84836?format=api",
            "vulnerability_id": "VCID-evjq-akma-sfhf",
            "summary": "libwmf: Memory allocation failure in wmf_malloc",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9011.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9011.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6553",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65664",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6566",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65645",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65616",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65651",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65578",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65608",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65575",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65639",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9011"
                },
                {
                    "reference_url": "https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9011"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/10/25/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/10/25/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/93860"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388450",
                    "reference_id": "1388450",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388450"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842090",
                    "reference_id": "842090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842090"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wvware:libwmf:0.2.8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wvware:libwmf:0.2.8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wvware:libwmf:0.2.8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9011",
                    "reference_id": "CVE-2016-9011",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9011"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371633?format=api",
                    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14"
                }
            ],
            "aliases": [
                "CVE-2016-9011"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-evjq-akma-sfhf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41556?format=api",
            "vulnerability_id": "VCID-j15c-u5ty-jug1",
            "summary": "Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgz"
                },
                {
                    "reference_url": "http://bugs.libgd.org/?do=details&task_id=89",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.libgd.org/?do=details&task_id=89"
                },
                {
                    "reference_url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://fedoranews.org/updates/FEDORA-2007-205.shtml"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html"
                },
                {
                    "reference_url": "http://osvdb.org/37745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/37745"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3472.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90599",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90605",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90587",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90593",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90602",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.09309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9272",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.09309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92727",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.09309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92733",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.09309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9273",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.11193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93496",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.11193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9349",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93487",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3472"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=277421"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25855"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25860"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26272"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26390"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26415",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26415"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26467",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26467"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26663"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26766"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26856"
                },
                {
                    "reference_url": "http://secunia.com/advisories/29157",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/29157"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30168",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30168"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42813"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200708-05.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200711-34.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200805-13.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35108"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-1643",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-1643"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11067"
                },
                {
                    "reference_url": "http://www.libgd.org/ReleaseNote020035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.libgd.org/ReleaseNote020035"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:153"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
                },
                {
                    "reference_url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/478796/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/24651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/24651"
                },
                {
                    "reference_url": "http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.secweb.se/en/advisories/gd-gdimagecreatetruecolor-integer-overflow/"
                },
                {
                    "reference_url": "http://www.trustix.org/errata/2007/0024/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.trustix.org/errata/2007/0024/"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/2336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/2336"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0022"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=276751",
                    "reference_id": "276751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=276751"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.33:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.34:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:2.0.35:rc4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:gd_graphics_library:*:rc5:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3472",
                    "reference_id": "CVE-2007-3472",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3472"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200708-05",
                    "reference_id": "GLSA-200708-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200708-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0146",
                    "reference_id": "RHSA-2008:0146",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0146"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371633?format=api",
                    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14"
                }
            ],
            "aliases": [
                "CVE-2007-3472"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j15c-u5ty-jug1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41410?format=api",
            "vulnerability_id": "VCID-kym4-etgv-u3bv",
            "summary": "libwmf bundles an old GD version which contains a \"use-after-free\"\n    vulnerability.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1364.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1364.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1364",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86907",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8684",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8686",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86854",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86882",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86895",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8689",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86885",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86908",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1364"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=496864",
                    "reference_id": "496864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496864"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526434",
                    "reference_id": "526434",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526434"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200907-01",
                    "reference_id": "GLSA-200907-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200907-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0457",
                    "reference_id": "RHSA-2009:0457",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0457"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/769-1/",
                    "reference_id": "USN-769-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/769-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371633?format=api",
                    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14"
                }
            ],
            "aliases": [
                "CVE-2009-1364"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kym4-etgv-u3bv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41555?format=api",
            "vulnerability_id": "VCID-tttf-2akk-57ez",
            "summary": "Multiple vulnerabilities have been discovered in GD, allowing for the\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://bugs.libgd.org/?do=details&task_id=86",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.libgd.org/?do=details&task_id=86"
                },
                {
                    "reference_url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html"
                },
                {
                    "reference_url": "http://osvdb.org/35788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/35788"
                },
                {
                    "reference_url": "http://osvdb.org/36643",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/36643"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2007-0889.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2007-0889.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2756.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91368",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91365",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91343",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91341",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06829",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91366",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91498",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91542",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91538",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91505",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91511",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91519",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91532",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2756"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25353",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25353"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25362"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25378"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25535"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25575"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25590",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25590"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25646"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25657"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25658"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25787"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25855"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26048"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26231"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26390"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26871",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26871"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26895",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26895"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26930",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26930"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26967"
                },
                {
                    "reference_url": "http://secunia.com/advisories/27037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/27037"
                },
                {
                    "reference_url": "http://secunia.com/advisories/27102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/27102"
                },
                {
                    "reference_url": "http://secunia.com/advisories/27110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/27110"
                },
                {
                    "reference_url": "http://secunia.com/advisories/27545",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/27545"
                },
                {
                    "reference_url": "http://secunia.com/advisories/29157",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/29157"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30168",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30168"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200708-05.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200708-05.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200711-34.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200805-13.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34420"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-1394",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-1394"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml"
                },
                {
                    "reference_url": "http://www.libgd.org/ReleaseNote020035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.libgd.org/ReleaseNote020035"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:122"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:123"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:124"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:187"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2007_13_sr.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2007_13_sr.html"
                },
                {
                    "reference_url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html"
                },
                {
                    "reference_url": "http://www.php.net/releases/5_2_3.php",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.php.net/releases/5_2_3.php"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0890.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0890.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0891.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0891.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0146.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/24089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/24089"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1018187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1018187"
                },
                {
                    "reference_url": "http://www.trustix.org/errata/2007/0019/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.trustix.org/errata/2007/0019/"
                },
                {
                    "reference_url": "http://www.trustix.org/errata/2007/0023/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.trustix.org/errata/2007/0023/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-473-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-473-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/1904",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/1904"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/1905",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/1905"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/2016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/2016"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/2336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/2336"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/3386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/3386"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=242033",
                    "reference_id": "242033",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=242033"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584",
                    "reference_id": "425584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425584"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgd:libgd:2.0.34:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2756",
                    "reference_id": "CVE-2007-2756",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2756"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200708-05",
                    "reference_id": "GLSA-200708-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200708-05"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200710-02",
                    "reference_id": "GLSA-200710-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200710-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0889",
                    "reference_id": "RHSA-2007:0889",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0889"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0890",
                    "reference_id": "RHSA-2007:0890",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0890"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0891",
                    "reference_id": "RHSA-2007:0891",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0891"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0146",
                    "reference_id": "RHSA-2008:0146",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0146"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/473-1/",
                    "reference_id": "USN-473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/473-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371633?format=api",
                    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14"
                }
            ],
            "aliases": [
                "CVE-2007-2756"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tttf-2akk-57ez"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48429?format=api",
            "vulnerability_id": "VCID-v3cm-pjc9-6bhq",
            "summary": "libwmf is vulnerable to an integer overflow potentially resulting in the\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3376.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3376.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.12232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93876",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.12232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93808",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.12232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93817",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93826",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93838",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.12232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93841",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.12232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93846",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.12232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93869",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.12232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93875",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3376"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618139",
                    "reference_id": "1618139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618139"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=381538",
                    "reference_id": "381538",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=381538"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-17",
                    "reference_id": "GLSA-200608-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-17"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0597",
                    "reference_id": "RHSA-2006:0597",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0597"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/333-1/",
                    "reference_id": "USN-333-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/333-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371633?format=api",
                    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14"
                }
            ],
            "aliases": [
                "CVE-2006-3376"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v3cm-pjc9-6bhq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36659?format=api",
            "vulnerability_id": "VCID-zc4g-jn49-63gd",
            "summary": "Multiple vulnerabilities have been found in libwmf allowing remote\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4695.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4695.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81448",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81346",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81355",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81377",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81375",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81403",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81408",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81429",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81417",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81409",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81446",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81447",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235665",
                    "reference_id": "1235665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235665"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205",
                    "reference_id": "784205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-03",
                    "reference_id": "GLSA-201602-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1917",
                    "reference_id": "RHSA-2015:1917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1917"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2670-1/",
                    "reference_id": "USN-2670-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2670-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371633?format=api",
                    "purl": "pkg:alpm/archlinux/libwmf@0.2.8.4-14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-14"
                }
            ],
            "aliases": [
                "CVE-2015-4695"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zc4g-jn49-63gd"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/libwmf@0.2.8.4-13"
}