Lookup for vulnerable packages by Package URL.

GET /api/packages/571174?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/571174?format=api",
    "purl": "pkg:deb/debian/libxfont@1:1.4.1-5",
    "type": "deb",
    "namespace": "debian",
    "name": "libxfont",
    "version": "1:1.4.1-5",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "1:2.0.3-1",
    "latest_non_vulnerable_version": "1:2.0.3-1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56199?format=api",
            "vulnerability_id": "VCID-19c4-kwxh-kybw",
            "summary": "Multiple vulnerabilities have been found in libXfont, the worst of\n    which could result in execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1804.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1804.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84673",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84689",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84709",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84711",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84733",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8474",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84758",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84753",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84747",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84769",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8477",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84768",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203719",
                    "reference_id": "1203719",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203719"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-21",
                    "reference_id": "GLSA-201507-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1708",
                    "reference_id": "RHSA-2015:1708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1708"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2536-1/",
                    "reference_id": "USN-2536-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2536-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571176?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.4.5-5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19c4-kwxh-kybw"
                        },
                        {
                            "vulnerability": "VCID-2w1u-kcvp-rygj"
                        },
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-5fjg-kuqy-ekbn"
                        },
                        {
                            "vulnerability": "VCID-7sx8-amfh-wuh4"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-dmke-csaa-e3cr"
                        },
                        {
                            "vulnerability": "VCID-vs3c-a2u9-bqge"
                        },
                        {
                            "vulnerability": "VCID-xhfh-vnnu-6kgj"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.5-5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036654?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.5.1-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.5.1-1"
                }
            ],
            "aliases": [
                "CVE-2015-1804"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-19c4-kwxh-kybw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56197?format=api",
            "vulnerability_id": "VCID-2w1u-kcvp-rygj",
            "summary": "Multiple vulnerabilities have been found in libXfont, the worst of\n    which could result in execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1802.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1802.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82534",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82547",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82562",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82559",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82585",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82593",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82611",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82605",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82599",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82635",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82636",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82639",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1802"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203715",
                    "reference_id": "1203715",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203715"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-21",
                    "reference_id": "GLSA-201507-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1708",
                    "reference_id": "RHSA-2015:1708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1708"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2536-1/",
                    "reference_id": "USN-2536-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2536-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571176?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.4.5-5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19c4-kwxh-kybw"
                        },
                        {
                            "vulnerability": "VCID-2w1u-kcvp-rygj"
                        },
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-5fjg-kuqy-ekbn"
                        },
                        {
                            "vulnerability": "VCID-7sx8-amfh-wuh4"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-dmke-csaa-e3cr"
                        },
                        {
                            "vulnerability": "VCID-vs3c-a2u9-bqge"
                        },
                        {
                            "vulnerability": "VCID-xhfh-vnnu-6kgj"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.5-5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036654?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.5.1-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.5.1-1"
                }
            ],
            "aliases": [
                "CVE-2015-1802"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2w1u-kcvp-rygj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60426?format=api",
            "vulnerability_id": "VCID-3674-8j3b-xkee",
            "summary": "Multiple vulnerabilities have been found in LibXfont and Libxfont2,\n    the worst of which could allow attackers to cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13720.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13720.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19676",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19787",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19741",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19684",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1966",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19662",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19867",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19923",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1965",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1973",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19782",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28177",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13720"
                },
                {
                    "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1054285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.suse.com/show_bug.cgi?id=1054285"
                },
                {
                    "reference_url": "https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13720"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13722"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:P/A:N"
                        },
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.x.org/releases/individual/lib/libXfont2-2.0.2.tar.bz2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.x.org/releases/individual/lib/libXfont2-2.0.2.tar.bz2"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2017/dsa-3995"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500690",
                    "reference_id": "1500690",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500690"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13720",
                    "reference_id": "CVE-2017-13720",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:P"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13720"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-08",
                    "reference_id": "GLSA-201711-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201711-08"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3442-1/",
                    "reference_id": "USN-3442-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3442-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036655?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.5.1-1%2Bdeb8u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.5.1-1%252Bdeb8u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037215?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:2.0.1-3%2Bdeb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.1-3%252Bdeb9u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1054187?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:2.0.3-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2017-13720"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3674-8j3b-xkee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56046?format=api",
            "vulnerability_id": "VCID-5fjg-kuqy-ekbn",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0211.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0211.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0211",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85085",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85097",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85115",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85119",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8514",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85147",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85162",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85159",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85156",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85177",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85178",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85176",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0211"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096601",
                    "reference_id": "1096601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096601"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-11",
                    "reference_id": "GLSA-201406-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1870",
                    "reference_id": "RHSA-2014:1870",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1870"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1893",
                    "reference_id": "RHSA-2014:1893",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1893"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2211-1/",
                    "reference_id": "USN-2211-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2211-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571176?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.4.5-5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19c4-kwxh-kybw"
                        },
                        {
                            "vulnerability": "VCID-2w1u-kcvp-rygj"
                        },
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-5fjg-kuqy-ekbn"
                        },
                        {
                            "vulnerability": "VCID-7sx8-amfh-wuh4"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-dmke-csaa-e3cr"
                        },
                        {
                            "vulnerability": "VCID-vs3c-a2u9-bqge"
                        },
                        {
                            "vulnerability": "VCID-xhfh-vnnu-6kgj"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.5-5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036654?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.5.1-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.5.1-1"
                }
            ],
            "aliases": [
                "CVE-2014-0211"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5fjg-kuqy-ekbn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56198?format=api",
            "vulnerability_id": "VCID-7sx8-amfh-wuh4",
            "summary": "Multiple vulnerabilities have been found in libXfont, the worst of\n    which could result in execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1803.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1803.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82275",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82288",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82307",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82302",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82329",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82336",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82356",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82349",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82344",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82378",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82379",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82382",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203718",
                    "reference_id": "1203718",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203718"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-21",
                    "reference_id": "GLSA-201507-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1708",
                    "reference_id": "RHSA-2015:1708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1708"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2536-1/",
                    "reference_id": "USN-2536-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2536-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571176?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.4.5-5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19c4-kwxh-kybw"
                        },
                        {
                            "vulnerability": "VCID-2w1u-kcvp-rygj"
                        },
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-5fjg-kuqy-ekbn"
                        },
                        {
                            "vulnerability": "VCID-7sx8-amfh-wuh4"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-dmke-csaa-e3cr"
                        },
                        {
                            "vulnerability": "VCID-vs3c-a2u9-bqge"
                        },
                        {
                            "vulnerability": "VCID-xhfh-vnnu-6kgj"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.5-5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036654?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.5.1-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.5.1-1"
                }
            ],
            "aliases": [
                "CVE-2015-1803"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7sx8-amfh-wuh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33656?format=api",
            "vulnerability_id": "VCID-8kcf-9dwq-dybz",
            "summary": "A vulnerability has been found in LibXfont and LibXfont2 which may\n    allow for arbitrary file access.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16611.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16611.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1755",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17542",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17606",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17553",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17498",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17507",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17759",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17486",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17574",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17634",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17653",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16611"
                },
                {
                    "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1050459",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.suse.com/show_bug.cgi?id=1050459"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16611"
                },
                {
                    "reference_url": "http://security.cucumberlinux.com/security/details.php?id=155",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.cucumberlinux.com/security/details.php?id=155"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00028.html"
                },
                {
                    "reference_url": "https://marc.info/?l=freedesktop-xorg-announce&m=151188044218304&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://marc.info/?l=freedesktop-xorg-announce&m=151188044218304&w=2"
                },
                {
                    "reference_url": "https://marc.info/?l=freedesktop-xorg-announce&m=151188049718337&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://marc.info/?l=freedesktop-xorg-announce&m=151188049718337&w=2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2017/11/28/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2017/11/28/7"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3500-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-3500-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519082",
                    "reference_id": "1519082",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519082"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883929",
                    "reference_id": "883929",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883929"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfont:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x:libxfont:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libxfont:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16611",
                    "reference_id": "CVE-2017-16611",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16611"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201801-10",
                    "reference_id": "GLSA-201801-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201801-10"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3500-1/",
                    "reference_id": "USN-3500-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3500-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1054187?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:2.0.3-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2017-16611"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8kcf-9dwq-dybz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56044?format=api",
            "vulnerability_id": "VCID-dmke-csaa-e3cr",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0209.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0209.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37994",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38175",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38198",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38068",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38118",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38126",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38144",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38108",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38084",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3813",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3811",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38046",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0209"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096593",
                    "reference_id": "1096593",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096593"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-11",
                    "reference_id": "GLSA-201406-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1870",
                    "reference_id": "RHSA-2014:1870",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1870"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1893",
                    "reference_id": "RHSA-2014:1893",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1893"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2211-1/",
                    "reference_id": "USN-2211-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2211-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571176?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.4.5-5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19c4-kwxh-kybw"
                        },
                        {
                            "vulnerability": "VCID-2w1u-kcvp-rygj"
                        },
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-5fjg-kuqy-ekbn"
                        },
                        {
                            "vulnerability": "VCID-7sx8-amfh-wuh4"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-dmke-csaa-e3cr"
                        },
                        {
                            "vulnerability": "VCID-vs3c-a2u9-bqge"
                        },
                        {
                            "vulnerability": "VCID-xhfh-vnnu-6kgj"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.5-5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036654?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.5.1-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.5.1-1"
                }
            ],
            "aliases": [
                "CVE-2014-0209"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dmke-csaa-e3cr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47798?format=api",
            "vulnerability_id": "VCID-sg7w-33jd-2yap",
            "summary": "Multiple vulnerabilities have been found in libXfont, the worst of\n    which allow for local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2895.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2895.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2895",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91431",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91437",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91447",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91455",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91467",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91474",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91479",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91482",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9148",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91504",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91499",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2895"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=727624",
                    "reference_id": "727624",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727624"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201402-23",
                    "reference_id": "GLSA-201402-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201402-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1154",
                    "reference_id": "RHSA-2011:1154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1154"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1155",
                    "reference_id": "RHSA-2011:1155",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1155"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1161",
                    "reference_id": "RHSA-2011:1161",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1161"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1834",
                    "reference_id": "RHSA-2011:1834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1834"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1191-1/",
                    "reference_id": "USN-1191-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1191-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571176?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.4.5-5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19c4-kwxh-kybw"
                        },
                        {
                            "vulnerability": "VCID-2w1u-kcvp-rygj"
                        },
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-5fjg-kuqy-ekbn"
                        },
                        {
                            "vulnerability": "VCID-7sx8-amfh-wuh4"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-dmke-csaa-e3cr"
                        },
                        {
                            "vulnerability": "VCID-vs3c-a2u9-bqge"
                        },
                        {
                            "vulnerability": "VCID-xhfh-vnnu-6kgj"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.5-5"
                }
            ],
            "aliases": [
                "CVE-2011-2895"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sg7w-33jd-2yap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56045?format=api",
            "vulnerability_id": "VCID-vs3c-a2u9-bqge",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0210.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0210.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0210",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84017",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84031",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84048",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8405",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84074",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8408",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84098",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84091",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84087",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84109",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84112",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84114",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0210"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096597",
                    "reference_id": "1096597",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1096597"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-11",
                    "reference_id": "GLSA-201406-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1870",
                    "reference_id": "RHSA-2014:1870",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1870"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1893",
                    "reference_id": "RHSA-2014:1893",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1893"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2211-1/",
                    "reference_id": "USN-2211-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2211-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571176?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.4.5-5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19c4-kwxh-kybw"
                        },
                        {
                            "vulnerability": "VCID-2w1u-kcvp-rygj"
                        },
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-5fjg-kuqy-ekbn"
                        },
                        {
                            "vulnerability": "VCID-7sx8-amfh-wuh4"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-dmke-csaa-e3cr"
                        },
                        {
                            "vulnerability": "VCID-vs3c-a2u9-bqge"
                        },
                        {
                            "vulnerability": "VCID-xhfh-vnnu-6kgj"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.5-5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036654?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.5.1-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.5.1-1"
                }
            ],
            "aliases": [
                "CVE-2014-0210"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vs3c-a2u9-bqge"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47799?format=api",
            "vulnerability_id": "VCID-xhfh-vnnu-6kgj",
            "summary": "Multiple vulnerabilities have been found in libXfont, the worst of\n    which allow for local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6462.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6462.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6462",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.12029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93742",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.12029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93751",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93761",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93764",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93773",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.12029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93775",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.12029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9378",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.12029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93781",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.12029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93803",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.12029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93808",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.12029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9381",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6462"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1048044",
                    "reference_id": "1048044",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1048044"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201402-23",
                    "reference_id": "GLSA-201402-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201402-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0018",
                    "reference_id": "RHSA-2014:0018",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0018"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2078-1/",
                    "reference_id": "USN-2078-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2078-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571176?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.4.5-5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19c4-kwxh-kybw"
                        },
                        {
                            "vulnerability": "VCID-2w1u-kcvp-rygj"
                        },
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-5fjg-kuqy-ekbn"
                        },
                        {
                            "vulnerability": "VCID-7sx8-amfh-wuh4"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-dmke-csaa-e3cr"
                        },
                        {
                            "vulnerability": "VCID-vs3c-a2u9-bqge"
                        },
                        {
                            "vulnerability": "VCID-xhfh-vnnu-6kgj"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.5-5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036654?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.5.1-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.5.1-1"
                }
            ],
            "aliases": [
                "CVE-2013-6462"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xhfh-vnnu-6kgj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60427?format=api",
            "vulnerability_id": "VCID-yduw-uqsw-g7b9",
            "summary": "Multiple vulnerabilities have been found in LibXfont and Libxfont2,\n    the worst of which could allow attackers to cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13722.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13722.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20599",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2072",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20677",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20624",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2061",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20608",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20789",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20848",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20562",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20639",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.207",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27759",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13722"
                },
                {
                    "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1049692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.suse.com/show_bug.cgi?id=1049692"
                },
                {
                    "reference_url": "https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=672bb944311392e2415b39c0d63b1e1902905bcd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=672bb944311392e2415b39c0d63b1e1902905bcd"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13720"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13722"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:P"
                        },
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.x.org/releases/individual/lib/libXfont2-2.0.2.tar.bz2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.x.org/releases/individual/lib/libXfont2-2.0.2.tar.bz2"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2017/dsa-3995"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500693",
                    "reference_id": "1500693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500693"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13722",
                    "reference_id": "CVE-2017-13722",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:P"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13722"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-08",
                    "reference_id": "GLSA-201711-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201711-08"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3442-1/",
                    "reference_id": "USN-3442-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3442-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036655?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:1.5.1-1%2Bdeb8u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.5.1-1%252Bdeb8u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037215?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:2.0.1-3%2Bdeb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3674-8j3b-xkee"
                        },
                        {
                            "vulnerability": "VCID-8kcf-9dwq-dybz"
                        },
                        {
                            "vulnerability": "VCID-yduw-uqsw-g7b9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.1-3%252Bdeb9u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1054187?format=api",
                    "purl": "pkg:deb/debian/libxfont@1:2.0.3-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:2.0.3-1"
                }
            ],
            "aliases": [
                "CVE-2017-13722"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yduw-uqsw-g7b9"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "3.2",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxfont@1:1.4.1-5"
}